Sciweavers

525 search results - page 60 / 105
» Threshold Schemes with Disenrollment
Sort
View
ICDAR
2009
IEEE
15 years 6 months ago
Devanagari and Bangla Text Extraction from Natural Scene Images
With the increasing popularity of digital cameras attached with various handheld devices, many new computational challenges have gained significance. One such problem is extractio...
Ujjwal Bhattacharya, Swapan K. Parui, Srikanta Mon...
FGCN
2008
IEEE
335views Communications» more  FGCN 2008»
15 years 6 months ago
Barycentric Location Estimation for Indoors Localization in Opportunistic Wireless Networks
The localization requirements for mobile nodes in wireless (sensor) networks are increasing. However, most research works are based on range measurements between nodes which are o...
GuoDong Kang, Tanguy Pérennou, Michel Diaz
GLOBECOM
2008
IEEE
15 years 6 months ago
Enhancement of QoE in Audio-Video IP Transmission by Utilizing Tradeoff between Spatial and Temporal Quality for Video Packet Lo
— This paper proposes a methodology of video–stream output at the receiver for enhancing QoE (Quality of Experience) in audio–video IP transmission. The methodology copes wit...
Shuji Tasaka, Hikaru Yoshimi
ICC
2008
IEEE
133views Communications» more  ICC 2008»
15 years 6 months ago
Call Admission Control for Mobile Agent Based Handoff in Wireless Mesh Networks
Abstract—Wireless mesh network (WMN) has emerged recently as a promising technology for next-generation wireless networking. In WMN, it is important to provide an efficient hand...
Bo Rong, Yi Qian, Kejie Lu, Michel Kadoch
ICDCS
2008
IEEE
15 years 6 months ago
Analysis of Maximum Executable Length for Detecting Text-Based Malware
The possibility of using purely text stream (keyboardenterable) as carrier of malware is under-researched and often underestimated. A text attack can happen at multiple levels, fr...
P. Kumar Manna, Sanjay Ranka, Shigang Chen