Sciweavers

5962 search results - page 927 / 1193
» Working with Patterns and Code
Sort
View
TMC
2012
13 years 7 months ago
Secure Initialization of Multiple Constrained Wireless Devices for an Unaided User
—A number of protocols and mechanisms have been proposed to address the problem of initial secure key deployment in wireless networks. Most existing approaches work either with a...
Toni Perkovic, Mario Cagalj, Toni Mastelic, Nitesh...
CVPR
2008
IEEE
16 years 6 months ago
High resolution motion layer decomposition using dual-space graph cuts
We introduce a novel energy minimization method to decompose a video into a set of super-resolved moving layers. The proposed energy corresponds to the cost of coding the sequence...
Thomas Schoenemann, Daniel Cremers
ICIP
2008
IEEE
16 years 6 months ago
Receiver driven layered multicast with layer-aware forward error correction
A wide range of different capabilities and connection qualities typically characterizes receivers of mobile television services. Receiver driven layered multicast (RDLM) offers an...
Cornelius Hellge, Thomas Schierl, Thomas Wiegand
ICIP
2006
IEEE
16 years 6 months ago
Subjective Image Quality Tradeoffs Between Spatial Resolution and Quantization Noise
The importance of tradeoffs between spatial resolution and quantization noise has been examined in our previous work. Subjective experiments indicate that as the bitrate decreases...
Soo Hyun Bae, Thrasyvoulos N. Pappas, Biing-Hwang ...
ICIP
2000
IEEE
16 years 6 months ago
Copyright Labeling of Printed Images
Digital Watermarking is a labeling technique for digital images which embeds a code into the digital data so the data is marked. Watermarking techniques previously developed deal ...
Hagit Zabrodsky Hel-Or