Sciweavers

2629 search results - page 379 / 526
» complex 2009
Sort
View
ITICSE
2009
ACM
15 years 10 months ago
Software reuse and plagiarism: a code of practice
In general, university guidelines or policies on plagiarism are not sufficiently detailed to cope with the technical complexity of software. Software plagiarism can have a signiï¬...
J. Paul Gibson
IWCMC
2009
ACM
15 years 10 months ago
Quantized transmit beamforming with antenna selection in a MIMO channel
For a point-to-point multi-input multi-output (MIMO) wireless channel, we propose a feedback scheme, which consists of transmit-antenna selection algorithm and beamforming quantiz...
Wiroonsak Santipach
JCDL
2009
ACM
115views Education» more  JCDL 2009»
15 years 10 months ago
Using timed-release cryptography to mitigate the preservation risk of embargo periods
Due to temporary access restrictions, embargoed data cannot be refreshed to unlimited parties during the embargo time interval. A solution to mitigate the risk of data loss has be...
Rabia Haq, Michael L. Nelson
MM
2009
ACM
171views Multimedia» more  MM 2009»
15 years 10 months ago
SaVE: sensor-assisted motion estimation for efficient h.264/AVC video encoding
Motion estimation is a key component of modern video encoding and is very compute-intensive. We present a novel Sensor-assisted Video Encoding (SaVE) method to reduce the computat...
XiaoMing Chen, Zhendong Zhao, Ahmad Rahmati, Ye Wa...
MM
2009
ACM
196views Multimedia» more  MM 2009»
15 years 10 months ago
Mirror world navigation for mobile users based on augmented reality
Finding a destination in unfamiliar environments of complex office building or shopping mall has been always bothering us in daily life. Fine-scale directional guidance, a combina...
Patricia P. Wang, Tao Wang, Dayong Ding, Yimin Zha...