Sciweavers

2945 search results - page 410 / 589
» Noisy Network Coding
Sort
View
ICIP
2002
IEEE
16 years 4 months ago
A no-reference perceptual blur metric
In this paper, we present a no-reference blur metric for images and video. The blur metric is based on the analysis of the spread of the edges in an image. Its perceptual signific...
Frédéric Dufaux, Pina Marziliano, St...
ICASSP
2008
IEEE
15 years 9 months ago
Layered wireless video multicast using omni-directional relays
— Wireless video multicast enables delivery of popular events to many wireless users in a bandwidth efficient manner. However, providing good and stable video quality to a large...
Ozgu Alay, Thanasis Korakis, Yao Wang, Elza Erkip,...
MMSEC
2006
ACM
129views Multimedia» more  MMSEC 2006»
15 years 9 months ago
WLAN steganography: a first practical review
Two different approaches for constructing a steganographic channel in an IEEE 802.11 (WLAN) network are introduced in this paper. First test results on the reliability, undetectab...
Christian Krätzer, Jana Dittmann, Andreas Lan...
IPPS
2005
IEEE
15 years 8 months ago
Some Issues in Solving the Anomaly Detection Problem using Immunological Approach
Results of an experimental study of an anomaly detection system based on the paradigm of artificial immune systems (AISs) are presented. Network traffic data are mapped into ant...
Franciszek Seredynski, Pascal Bouvry
CASCON
2006
149views Education» more  CASCON 2006»
15 years 4 months ago
Packet decoding using context sensitive parsing
Protocol tester is a project at RMC and Queen's that applies program transformation techniques to protocol data to evaluate the security of network applications. As part of t...
Sylvain Marquis, Thomas R. Dean, Scott Knight