Sciweavers

15782 search results - page 2914 / 3157
» Network Optimization and Control
Sort
View
TCSV
2010
14 years 10 months ago
Perceptually Unequal Packet Loss Protection by Weighting Saliency and Error Propagation
We describe a method for achieving perceptually minimal video distortion over packet-erasure networks using perceptually unequal loss protection (PULP). There are two main ingredie...
Hojin Ha, Jincheol Park, Sanghoon Lee, Alan Conrad...
TCSV
2010
14 years 10 months ago
Cross-Layer Packet Retry Limit Adaptation for Video Transport Over Wireless LANs
Video transport over wireless networks requires retransmissions to successfully deliver video data to a receiver in case of packet loss, leading to increased delay time for the dat...
Chih-Ming Chen, Chia-Wen Lin, Yung-Chang Chen
TELSYS
2010
140views more  TELSYS 2010»
14 years 10 months ago
Information system security compliance to FISMA standard: a quantitative measure
To ensure that safeguards are implemented to protect against a majority of known threats, industry leaders are requiring information processing systems to comply with security stan...
Elaine Hulitt, Rayford B. Vaughn
TITS
2010
110views Education» more  TITS 2010»
14 years 10 months ago
Research Collaboration and ITS Topic Evolution: 10 Years at T-ITS
This paper investigates the collaboration patterns and research topic trends in the publications of the IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS (T-ITS) over the pas...
Linjing Li, Xin Li, Changjian Cheng, Cheng Chen, G...
IUI
2011
ACM
14 years 6 months ago
Groups without tears: mining social topologies from email
As people accumulate hundreds of “friends” in social media, a flat list of connections becomes unmanageable. Interfaces agnostic to social structure hinder the nuanced sharin...
Diana MacLean, Sudheendra Hangal, Seng Keat Teh, M...
« Prev « First page 2914 / 3157 Last » Next »