Sciweavers

8068 search results - page 1401 / 1614
» Java Data Objects
Sort
View
INFOCOM
2008
IEEE
15 years 9 months ago
A Security Architecture Achieving Anonymity and Traceability in Wireless Mesh Networks
—Anonymity has received increasing attention in the literature due to the users’ awareness of their privacy nowadays. Anonymity provides protection for users to enjoy network s...
Jinyuan Sun, Chi Zhang, Yuguang Fang
ISCAS
2008
IEEE
195views Hardware» more  ISCAS 2008»
15 years 9 months ago
Multi-view depth video coding using depth view synthesis
— Depth information indicates the distance of an object in the three dimensional (3D) scene from the camera view-point, typically represented by eight bits. Since the depth map i...
Sang-Tae Na, Kwan-Jung Oh, Cheon Lee, Yo-Sung Ho
VL
2008
IEEE
171views Visual Languages» more  VL 2008»
15 years 9 months ago
Usability challenges for enterprise service-oriented architecture APIs
An important part of many programming tasks is the use of libraries and other forms of Application Programming Interfaces (APIs). Programming via web services using a Service-Orie...
Jack Beaton, Sae Young Jeong, Yingyu Xie, Jeffrey ...
AVSS
2007
IEEE
15 years 9 months ago
On the effect of motion segmentation techniques in description based adaptive video transmission
This paper presents the results of analysing the effect of different motion segmentation techniques in a system that transmits the information captured by a static surveillance ca...
Juan Carlos San Miguel, José María M...
CISS
2007
IEEE
15 years 9 months ago
On Capacity of Automatic Target Recognition Systems Under the Constraint of PCA-Encoding
Limiting capabilities of practical recognition systems are determined by a variety of factors that include source encoding techniques, quality of images, complexity of underlying ...
Xiaohan Chen, Natalia A. Schmid
« Prev « First page 1401 / 1614 Last » Next »