Sciweavers

4383 search results - page 831 / 877
» Mobile Environmental Applications
Sort
View
PAMI
2011
14 years 6 months ago
Revisiting Linear Discriminant Techniques in Gender Recognition
—Emerging applications of computer vision and pattern recognition in mobile devices and networked computing require the development of resourcelimited algorithms. Linear classifi...
Juan Bekios-Calfa, José Miguel Buenaposada,...
TMC
2011
164views more  TMC 2011»
14 years 6 months ago
Security Games for Vehicular Networks
—Vehicular networks (VANETs) can be used to improve transportation security, reliability, and management. This paper investigates security aspects of VANETs within a game-theoret...
Tansu Alpcan, Sonja Buchegger
TSP
2011
210views more  TSP 2011»
14 years 6 months ago
Physical Layer Network Coding and Precoding for the Two-Way Relay Channel in Cellular Systems
In this paper, we study the application of physical layer network coding to the joint design of uplink and downlink transmissions, where the base station and the relay have multip...
Zhiguo Ding, Ioannis Krikidis, John S. Thompson, K...
ICASSP
2010
IEEE
14 years 6 months ago
Seamlets: Content-aware nonlinear wavelet transform
With the rise of mobile media devices, resizing an image or video to fit a screen of arbitrary size has become an important topic. In general, arbitrary resizing does not preserve...
David D. Conger, Hayder Radha, Mrityunjay Kumar
IJNSEC
2010
324views more  IJNSEC 2010»
14 years 6 months ago
Computing the Modular Inverse of a Polynomial Function over GF(2P) Using Bit Wise Operation
Most public key crypto systems use finite field modulo arithmetic. This modulo arithmetic is applied on real numbers, binary values and polynomial functions. The computation cost ...
Rajaram Ramasamy, Amutha Prabakar Muniyandi