Sciweavers

1491 search results - page 243 / 299
» Performance evaluation of distributed video coding schemes
Sort
View
161
Voted
COMCOM
2007
149views more  COMCOM 2007»
15 years 4 months ago
Adaptive security design with malicious node detection in cluster-based sensor networks
Distributed wireless sensor networks have problems on detecting and preventing malicious nodes, which always bring destructive threats and compromise multiple sensor nodes. Theref...
Meng-Yen Hsieh, Yueh-Min Huang, Han-Chieh Chao
CVPR
2008
IEEE
16 years 7 months ago
Motion segmentation via robust subspace separation in the presence of outlying, incomplete, or corrupted trajectories
We examine the problem of segmenting tracked feature point trajectories of multiple moving objects in an image sequence. Using the affine camera model, this motion segmentation pr...
René Vidal, Roberto Tron, Shankar Rao, Yi M...
ICC
2007
IEEE
15 years 11 months ago
Utility Maximization for OFDMA Systems Over Discrete Sets
— The main task in OFDM downlink scheduling design is to maximize some kind of utility considering user specific as well as system induced constraints. A typical example is the ...
Chan Zhou, Gerhard Wunder, Thomas Michel
INFOCOM
2007
IEEE
15 years 11 months ago
SmartTunnel: Achieving Reliability in the Internet
Abstract— Reliability is critical to a variety of network applications. Unfortunately, due to lack of QoS support across ISP boundaries, it is difficult to achieve even two 9s (...
Yi Li, Yin Zhang, Lili Qiu, Simon S. Lam
125
Voted
ISCA
2006
IEEE
142views Hardware» more  ISCA 2006»
15 years 11 months ago
Bulk Disambiguation of Speculative Threads in Multiprocessors
Transactional Memory (TM), Thread-Level Speculation (TLS), and Checkpointed multiprocessors are three popular architectural techniques based on the execution of multiple, cooperat...
Luis Ceze, James Tuck, Josep Torrellas, Calin Casc...