Sciweavers

4463 search results - page 543 / 893
» computer 2000
Sort
View
IIHMSP
2006
IEEE
148views Multimedia» more  IIHMSP 2006»
15 years 11 months ago
Video Streaming over 3G Networks with GOP-Based Priority Scheduling
— A bandwidth-efficient video streaming algorithm over the cdma2000 1x EV-DO network using GOP-based priority scheduling is proposed in this work. The proposed algorithm perform...
Yongjin Cho, Do-Kyoung Kwon, C. C. Jay Kuo, Renxia...
ICA
2004
Springer
15 years 10 months ago
Using Kernel PCA for Initialisation of Variational Bayesian Nonlinear Blind Source Separation Method
The variational Bayesian nonlinear blind source separation method introduced by Lappalainen and Honkela in 2000 is initialised with linear principal component analysis (PCA). Becau...
Antti Honkela, Stefan Harmeling, Leo Lundqvist, Ha...
ICBA
2004
Springer
180views Biometrics» more  ICBA 2004»
15 years 10 months ago
FVC2004: Third Fingerprint Verification Competition
A new technology evaluation of fingerprint verification algorithms has been organized following the approach of the previous FVC2000 and FVC2002 evaluations, with the aim of tracki...
Dario Maio, Davide Maltoni, Raffaele Cappelli, Jam...
ACSAC
2000
IEEE
15 years 9 months ago
A Reliable, Scalable General-Purpose Certificate Store
Although there have been various proposals to build large-scale PKIs, there appears to be no research publicly available on the underlying certificate store which will be required...
Peter Gutmann
ACSAC
2000
IEEE
15 years 9 months ago
Personal Security Environment on Palm PDA
Digital signature schemes are based on the assumption that the signing key is kept in secret. Ensuring that this assumption holds is one of the most crucial problems for all curre...
Margus Freudenthal, S. Heiberg, Jan Willemson