Sciweavers

3152 search results - page 564 / 631
» Robust Computer Vision for Computer Mediated Communication
Sort
View
115
Voted
INFOCOM
2006
IEEE
15 years 8 months ago
A Statistical Framework for Intrusion Detection in Ad Hoc Networks
— We focus on detecting intrusions in ad hoc networks using the misuse detection technique. We allow for detection modules that periodically fail to detect attacks and also gener...
Dhanant Subhadrabandhu, Saswati Sarkar, Farooq Anj...
111
Voted
MSWIM
2005
ACM
15 years 8 months ago
Trade-offs in bit-rate allocation for wireless video streaming
One of the central problems in video transmission over lossy channels is the choice of source and channel coding rates to allocate the available transmission rate optimally. In th...
Vladimir Vukadinovic, Gunnar Karlsson
109
Voted
SENSYS
2005
ACM
15 years 8 months ago
Z-MAC: a hybrid MAC for wireless sensor networks
This paper presents the design, implementation and performance evaluation of a hybrid MAC protocol, called Z-MAC, for wireless sensor networks that combines the strengths of TDMA ...
Injong Rhee, Ajit Warrier, Mahesh Aia, Jeongki Min
154
Voted
EUC
2005
Springer
15 years 8 months ago
Realtime H.264 Encoding System Using Fast Motion Estimation and Mode Decision
Abstract. H.264 provides various useful features such as improved coding efficiency and error robustness. These features enable mobile device to adopt H.264/AVC standard to achieve...
Byeong-Doo Choi, Min-Cheol Hwang, Jun-Ki Cho, Jin-...
121
Voted
WMASH
2004
ACM
15 years 8 months ago
Reputation-based Wi-Fi deployment protocols and security analysis
In recent years, wireless Internet service providers (WISPs) have established thousands of WiFi hot spots in cafes, hotels and airports in order to offer to travelling Internet u...
Naouel Ben Salem, Jean-Pierre Hubaux, Markus Jakob...