Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
IIH-MSP
IIH-MSP 2009
Generate Citations
Intelligent Information Hiding and Multimedia Signal Processing, International Conference on
Sept. 12 2009 to Sept. 14 2009
Kyoto, Japan
ISBN: 978-0-7695-3762-7
Table of Contents
Papers
Title Page i
Freely available from IEEE.
pp. i
Papers
Title Page iii
Freely available from IEEE.
pp. iii
Papers
Copyright Page
Freely available from IEEE.
pp. iv
Papers
Table of Contents
Freely available from IEEE.
pp. v-xxvii
Papers
Conference Information
Freely available from IEEE.
pp. xxviii-xxxix
Papers
A Two-Pass Filter for Impulse Noise Reduction Based on Edge Characteristics
Full-text access may be available. Sign in or learn about subscription options.
pp. 5-8
by
Chao-Yu Chen
,
Chao-Ho (Thou-Ho) Chen
,
Yi-Li Kuo
,
Chin-Hsing Chen
Papers
Vision-Based Hand Gesture Recognition Using PCA+Gabor Filters and SVM
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-4
by
Deng-Yuan Huang
,
Wu-Chih Hu
,
Sung-Hsiang Chang
Papers
A Fast Template Matching Method for Rotation Invariance Using Two-Stage Process
Full-text access may be available. Sign in or learn about subscription options.
pp. 9-12
by
Wen-Chia Lee
,
Chin-Hsing Chen
Papers
A Watermarking Scheme Using Code Division Multiple Access and DWT
Full-text access may be available. Sign in or learn about subscription options.
pp. 13-16
by
Ji-Hong Chen
,
Chin-Hsing Chen
Papers
A Compression-Resistant Invisible Watermarking Scheme for H.264
Full-text access may be available. Sign in or learn about subscription options.
pp. 17-20
by
Tsong-Yi Chen
,
Da-Jinn Wang
,
Thou-Ho (Chao-Ho) Chen
,
Yi-Long Lin
Papers
Information Embedding in MPEG-4 Scalable Lossless Audio
Full-text access may be available. Sign in or learn about subscription options.
pp. 21-24
by
Te Li
,
Susanto Rahardja
,
Haiyan Shu
,
Haibin Huang
Papers
An Algorithm for Packing Bitstream of Scalable Video Coding
Full-text access may be available. Sign in or learn about subscription options.
pp. 25-29
by
Jung-yang Kao
,
Jih-Sheng Tu
Papers
Fisherface vs. Eigenface in the Dual-tree Complex Wavelet Domain
Full-text access may be available. Sign in or learn about subscription options.
pp. 30-33
by
Bin Li
,
Kai-Kuang Ma
Papers
Security Evaluation of Biometrics Authentications for Cellular Phones
Full-text access may be available. Sign in or learn about subscription options.
pp. 34-39
by
Hirokazu Manabe
,
Yuta Yamakawa
,
Tomohiro Sasamoto
,
Ryoichi Sasaki
Papers
Watermarking Cryptographic Data
Full-text access may be available. Sign in or learn about subscription options.
pp. 40-43
by
Maki Yoshida
,
Toru Fujiwara
Papers
Evaluation of Audio Watermark System Using Short Detection Time Frame
Full-text access may be available. Sign in or learn about subscription options.
pp. 44-47
by
Takaaki Yamada
,
Yoshiyasu Takahashi
,
Ryu Ebisawa
,
Yoshinori Sato
,
Seiichi Susaki
Papers
Preventing False Positives in Content-Based Phishing Detection
Full-text access may be available. Sign in or learn about subscription options.
pp. 48-51
by
Shinta Nakayama
,
Isao Echizen
,
Hiroshi Yoshiura
Papers
XPROB - A Generalized Pool-Based Anonymous Communication Framework
Full-text access may be available. Sign in or learn about subscription options.
pp. 52-55
by
Minh-Triet Tran
,
Anh-Duc Duong
,
Isao Echizen
Papers
On Privacy-aware Delegation of Personal Data using Digital Watermarking
Full-text access may be available. Sign in or learn about subscription options.
pp. 56-59
by
Sven Wohlgemuth
,
Noboru Sonehara
,
Isao Echizen
,
Günter Müller
Papers
Web behind Web - A Steganographic Web Framework
Full-text access may be available. Sign in or learn about subscription options.
pp. 60-63
by
Hirohisa Hioki
Papers
Algorithm for Detecting Steganographic Information Based on Characteristic of Embedded Message
Full-text access may be available. Sign in or learn about subscription options.
pp. 64-67
by
Rongling Lang
,
Hui Lu
Papers
Multi-Layer Audio Watermarking Based on Amplitude Modification
Full-text access may be available. Sign in or learn about subscription options.
pp. 68-71
by
Akio Ogihara
,
Harumi Murata
,
Motoi Iwata
,
Akira Shiozaki
Papers
Audio Watermarking Using QIM on Wavelet Packet Coefficients
Full-text access may be available. Sign in or learn about subscription options.
pp. 72-75
by
Kotaro Sonoda
,
Osamu Takizawa
Papers
Robust Audio Watermarking with Time and Frequency Division
Full-text access may be available. Sign in or learn about subscription options.
pp. 76-81
by
Kotaro Yamamoto
,
Munetoshi Iwakiri
Papers
Embedding Limitations with Audio-watermarking Method Based on Cochlear-delay Characteristics
Full-text access may be available. Sign in or learn about subscription options.
pp. 82-85
by
Kuniaki Imabeppu
,
Daiki Hamada
,
Masashi Unoki
Papers
A Data Hiding Method for Stereo Audio Signals Using the Polarity of the Inter-Channel Decorrelator
Full-text access may be available. Sign in or learn about subscription options.
pp. 86-89
by
Kazuhiro Kondo
Papers
On the Channel Characteristic of Dither Modulation Data Hiding for MP3 Compression
Full-text access may be available. Sign in or learn about subscription options.
pp. 90-93
by
Raul Martinez-Noriega
,
Mariko Nakano
,
Kazuhiko Yamaguchi
Papers
A Robust Content in DCT Domain for Image Authentication
Full-text access may be available. Sign in or learn about subscription options.
pp. 94-97
by
Yuan-Gen Wang
,
Yan-Qiang Lei
Papers
Optimization of AVS-M Video Decoder for Real-time Implementation on Embedded RISC Processors
Full-text access may be available. Sign in or learn about subscription options.
pp. 98-101
by
Guo-An Jian
,
Jui-Chin Chu
,
Jiun-In Guo
Papers
Image Watermarking Based on Multiple Objective Genetic Algorithm
Full-text access may be available. Sign in or learn about subscription options.
pp. 102-105
by
Jiann-Shu Lee
,
Fong-Ping Chuang
,
Kuen-Horng Tsai
Papers
Feature Extraction for Face Recognition Based on Gabor Filters and Two-Dimensional Locality Preserving Projections
Full-text access may be available. Sign in or learn about subscription options.
pp. 106-109
by
Yi-Chun Lee
,
Chin-Hsing Chen
Papers
An Autonomous License Plate Detection Method
Full-text access may be available. Sign in or learn about subscription options.
pp. 110-113
by
Hsiao-Chen Kuo
,
Jiann-Shu Lee
,
Sho-Tsung Kao
Papers
Eye Tracking in Visible Environment
Full-text access may be available. Sign in or learn about subscription options.
pp. 114-117
by
Yung-Lung Kuo
,
Jiann-Shu Lee
,
Sho-Tsung Kao
Papers
Aspect Ratio Waves for Gait Analysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 118-121
by
Kuo-Wei Lin
,
Pau-Choo Chung
Papers
Adaptive Reed
Full-text access may be available. Sign in or learn about subscription options.
pp. 122-127
by
Heng Li
,
YanChun Zhong
Papers
Adaptive Rate Control Scheme in Frame-layer for Real-time H.264
Full-text access may be available. Sign in or learn about subscription options.
pp. 128-131
by
Myoung-Jin Kim
,
Min-Cheol Hong
Papers
A Semi-fragile Reversible Data Hiding by Coefficient-Bias Algorithm
Full-text access may be available. Sign in or learn about subscription options.
pp. 132-135
by
Ching-Yu Yang
,
Wu-Chih Hu
,
Po-Yen Chang
,
Chang-Min Hwang
Papers
3D Triangular Mesh Watermarking for Copyright Protection Using Moment-Preserving
Full-text access may be available. Sign in or learn about subscription options.
pp. 136-139
by
Chen-Tsung Kuo
,
Da-Chun Wu
,
Shyi-Chyi Cheng
Papers
Quality Evaluation of Digital Image Watermarking
Full-text access may be available. Sign in or learn about subscription options.
pp. 140-143
by
Qingtang Su
,
Xianxi Liu
,
Steve Zhang
Papers
Color Image Watermarking Scheme Based on Support Vector Regression
Full-text access may be available. Sign in or learn about subscription options.
pp. 144-147
by
Xiuli Lv
,
Hongyu Bian
,
Bo Yu
,
Xinghui Quan
Papers
Digital Watermarking Method for Printed Materials Embedding in Hue Component
Full-text access may be available. Sign in or learn about subscription options.
pp. 148-152
by
Yuta Goto
,
Osamu Uchida
Papers
Robust Perceptual Image Hashing Based Temporal Synchronization for Watermarked H.264 Frames
Full-text access may be available. Sign in or learn about subscription options.
pp. 153-156
by
Xun Gong
,
Hai-Ming Lu
Papers
Time-Scale Invariant Zero-Watermarking Scheme for Audio
Full-text access may be available. Sign in or learn about subscription options.
pp. 157-160
by
Ming-Quan Fan
,
Hong-Xia Wang
Papers
Employing Optimal Matrix for Efficient Matrix Embedding
Full-text access may be available. Sign in or learn about subscription options.
pp. 161-165
by
Yunkai Gao
,
Xiaolong Li
,
Bin Yang
Papers
An Attention Focusing Tree Based on Saliency and a Display Method for Small Displays
Full-text access may be available. Sign in or learn about subscription options.
pp. 166-169
by
Kenji Nakamura
,
Takashi Toriu
,
Shigeyoshi Nakajima
,
Hiromitsu Hama
Papers
Collision Detection of 4-legged Robots Using Acceleration Sensors
Full-text access may be available. Sign in or learn about subscription options.
pp. 170-173
by
Shigeyoshi Nakajima
,
Kana Sugimoto
,
Takashi Toriu
Papers
Three-Dimensional Circular Camera System for the Three-Dimensional Display Based on the Reconstruction of Parallax Rays
Full-text access may be available. Sign in or learn about subscription options.
pp. 174-177
by
Shuhei Miyatake
,
Hideya Takahashi
,
Kenji Yamada
Papers
Detection of Tire-Road Contact Point for Vehicle Position Estimate Considering Shape Distortion in a Circular Fisheye Image
Full-text access may be available. Sign in or learn about subscription options.
pp. 178-181
by
Kenichi Hirose
,
Takashi Toriu
,
Hiromitsu Hama
Papers
Optimal Crawling Strategies for Multimedia Search Engines
Full-text access may be available. Sign in or learn about subscription options.
pp. 182-185
by
Hiromitsu Hama
,
Thi Thi Zin
,
Pyke Tin
Papers
Dominant Color Embedded Markov Chain Model for Object Image Retrieval
Full-text access may be available. Sign in or learn about subscription options.
pp. 186-189
by
Thi Thi Zin
,
Pyke Tin
,
Takashi Toriu
,
Hiromitsu Hama
Papers
Mobile Sensor for Target Tracking via Modified Particle Filter
Full-text access may be available. Sign in or learn about subscription options.
pp. 190-193
by
Luke K. Wang
,
Shan-Chin Hsieh
,
Kou-Yuan Huang
,
Wen-Cheng Chen
Papers
A Region of Interest Rate-Control Scheme for Encoding Traffic Surveillance Videos
Full-text access may be available. Sign in or learn about subscription options.
pp. 194-197
by
Ching-Yu Wu
,
Po-Chyi Su
Papers
A New Approach to the Dynamic Timeline of Animation Engine
Full-text access may be available. Sign in or learn about subscription options.
pp. 198-201
by
Ningping Sun
,
Kentarou Okumura
,
Wenling Sun
Papers
An Alternative Algorithm of Triangulation of Polygons with Holes
Full-text access may be available. Sign in or learn about subscription options.
pp. 202-205
by
Ningping Sun
,
Satoshi Tanaka
,
Wenling Sun
Papers
DoS/DDoS Detection Scheme Using Statistical Method Based on the Destination Port Number
Full-text access may be available. Sign in or learn about subscription options.
pp. 206-209
by
Shunsuke Oshima
,
Arata Hirakawa
,
Takuo Nakashima
,
Toshinori Sueyoshi
Papers
Multi Path Based on Cache Notification Algorithm in Wireless Sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 210-213
by
Kuang Zhufang
,
Yang Guogui
Papers
Random Number Generated from White Noise of Webcam
Full-text access may be available. Sign in or learn about subscription options.
pp. 214-217
by
Jer-Min Tsai
,
I-Te Chen
,
Jengnan Tzeng
Papers
Quantization Parameter Decision of Initial and Scene Change Frame in Real-Time H.264/AVC
Full-text access may be available. Sign in or learn about subscription options.
pp. 218-221
by
Szu-Hong Wang
,
Shih-Chang Hsia
Papers
An Observer-Based Method for Secure Communication
Full-text access may be available. Sign in or learn about subscription options.
pp. 222-225
by
Long-Chang Chen
,
Tsair-Fwu Lee
,
Pei-Ju Chao
,
Wen-Cheng Chen
Papers
Performance Study of Asymmetric Traffic Load for OBS Ring Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 226-229
by
Shih-Wei Kau
,
Wei-Ting Lu
,
Wen-Ping Chen
,
Tsair-Fwu Lee
,
Cheng-Nan Tsai
Papers
Applications of Ontology in Management of Information Asset
Full-text access may be available. Sign in or learn about subscription options.
pp. 230-233
by
Shing-Han Li
,
Kuo-Chung Wang
Papers
High Dynamic Range Color Image Rendering with Human Visual Adaptation Simulation
Full-text access may be available. Sign in or learn about subscription options.
pp. 234-237
by
Ping-Lin Fan
,
Shih-Ying Chen
,
Wei-Hsien Wu
,
Joey Lin
,
Su-Ju Lu
,
Hsueh-Wu Wang
,
Yuan-Fan Tsai
Papers
The Design of Remote Surveillance System for Digital Family
Full-text access may be available. Sign in or learn about subscription options.
pp. 238-241
by
Chung-Hsin Liu
,
Chih-Chieh Fan
Papers
To Build Tele-care System Network Environment
Full-text access may be available. Sign in or learn about subscription options.
pp. 242-245
by
Chung-Hsin Liu
,
Jiun-Ting Chen
,
Chung-Min Wu
,
Chuen-Lung Chen
Papers
Traffic Warning and Vehicular Homogeneity Measurement Based on Multidimensional HMM Algorithm
Full-text access may be available. Sign in or learn about subscription options.
pp. 246-249
by
Chang-Lung Tsai
,
Wei-Lieh Hsu
Papers
Singular Point Detection in Fingerprint Images by a Bank of Discrete Fourier Filters
Full-text access may be available. Sign in or learn about subscription options.
pp. 250-253
by
Chih-Jen Lee
,
I-Horng Jeng
,
Tai-Ning Yang
,
Chun-Jung Chen
,
Peng Su
Papers
Build a Home Security Surveillance System Using LEGO MINDSTORMS NXT
Full-text access may be available. Sign in or learn about subscription options.
pp. 254-257
by
Kuo-Kai Hsu
,
Dwen-Ren Tsai
Papers
Touch-sensitive Alphanumeric Encrypting PIN Pad Design Based on Hamilton-connected Subgraph Recognition
Full-text access may be available. Sign in or learn about subscription options.
pp. 258-261
by
I-Horng Jeng
,
Dwen-Ren Tsai
,
Hou-An Chen
,
Yi-Chun Yen
,
Chien-Kang Cheng
Papers
Comments on Gateway-Oriented Password-Based Authenticated Key Exchange Protocol
Full-text access may be available. Sign in or learn about subscription options.
pp. 262-265
by
Tzong-Chen Wu
,
Hung-Yu Chien
Papers
Meaningful Inner Link Objects for Automatic Text Categorization
Full-text access may be available. Sign in or learn about subscription options.
pp. 266-269
by
Jau-Ji Shen
,
Jia-Chiuan Wu
Papers
Identity-Based DRM in Ubiquitous Multimedia System
Full-text access may be available. Sign in or learn about subscription options.
pp. 270-273
by
Chou-Chen Yang
,
Ju-Chun Hsiao
,
Hung-Wen Yang
Papers
A Novel Mutual Authentication Based on Data Embedding Technique
Full-text access may be available. Sign in or learn about subscription options.
pp. 274-277
by
Chia-Chen Lin
,
Po-Hsuan Chiang
Papers
Embedding Secret Messages Using Modified Huffman Coding
Full-text access may be available. Sign in or learn about subscription options.
pp. 278-281
by
Kuo-Nan Chen
,
Chin-Feng Lee
,
Chin-Chen Chang
,
Huang-Ching Lin
Papers
Joint Secret Image Sharing and Progressive Transmission Based on Integer Discrete Cosine Transform
Full-text access may be available. Sign in or learn about subscription options.
pp. 282-285
by
Zhenfei Zhao
,
Hao Luo
,
Zhe-Ming Lu
Papers
A Fast and Novel Intra and Inter Modes Decision Prediction Algorithm for H.264/AVC Based on the Characteristics of Macro-block
Full-text access may be available. Sign in or learn about subscription options.
pp. 286-289
by
Pengyu Liu
,
Kebin Jia
Papers
A Fast Image Retrieval Method Using Multi-Feature Dimension Technique
Full-text access may be available. Sign in or learn about subscription options.
pp. 290-294
by
Kuo Lung Hung
,
Yih Cheng Tsay
Papers
Secret Sharing Method for Gray-level Images
Full-text access may be available. Sign in or learn about subscription options.
pp. 295-298
by
Hao-Kuan Tso
,
Der-Chyuan Lou
,
Dah-Lih Jeng
,
Chao-Lung Chou
Papers
A Novel Retinal Blood Vessel Segmentation Method Based on Line Operator and Edge Detector
Full-text access may be available. Sign in or learn about subscription options.
pp. 299-302
by
Chin-Chen Chang
,
Chia-Chen Lin
,
Pei-Yan Pai
,
Yen-Chang Chen
Papers
Mining Sequential Patterns for Image Classification in Ubiquitous Multimedia Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 303-306
by
Ming-Yen Lin
,
Sue-Chen Hsueh
,
Ming-Hong Chen
,
Hong-Yang Hsu
Papers
Salt-and-Pepper Noise Elimination by PI-Remover and Modified AMF Noise Detectors
Full-text access may be available. Sign in or learn about subscription options.
pp. 307-311
by
Li-Chun Liao
,
Shin-Jung Gu
,
Bin-Chyi Tseng
Papers
H.264/AVC-Based Depth Map Sequence Coding Using Improved Loop-filter
Full-text access may be available. Sign in or learn about subscription options.
pp. 312-315
by
Nan Zhang
,
Siwei Ma
Papers
Shape-Based Depth Map Coding
Full-text access may be available. Sign in or learn about subscription options.
pp. 316-319
by
Nan Zhang
,
Siwei Ma
,
Wen Gao
Papers
Reversible Steganography for VQ Indices Using the Modified State Codebook
Full-text access may be available. Sign in or learn about subscription options.
pp. 320-323
by
Chin-Chen Chang
,
Chi-Shiang Chan
,
Zhi-Hui Wang
,
Ming-Chu Li
Papers
Sharing Secrets and Reversibly Reconstructing the Cover Image Using Two Meaningful Shadows
Full-text access may be available. Sign in or learn about subscription options.
pp. 324-327
by
The Duc Kieu
,
Chin-Chen Chang
,
Zhi-Hui Wang
,
Ming-Chu Li
Papers
Matrix Selection in High Payload Embedding
Full-text access may be available. Sign in or learn about subscription options.
pp. 328-331
by
Zhenxing Qian
,
Xinpeng Zhang
,
Shuozhong Wang
Papers
Enlargement of Balanced-Incomplete-Block-Designs-Based Watermarks
Full-text access may be available. Sign in or learn about subscription options.
pp. 332-335
by
Zhi-Fang Yang
,
Po-Chen Lee
,
Wei-Hung Chen
,
Jia-Guu Leu
Papers
Security of Indirect-Authenticated Key Exchange Protocol
Full-text access may be available. Sign in or learn about subscription options.
pp. 336-339
by
Hsu-Hung Chiang
,
Ching-Chung Liu
,
Ying-Ming Chen
,
Ya-Fen Chang
Papers
A Video Watermarking in H.264/AVC Encoder
Full-text access may be available. Sign in or learn about subscription options.
pp. 340-343
by
Shinfeng D. Lin
,
Chih-Yao Chuang
,
Hsiang-Cheng Meng
Papers
Electrical Impedance Tomography for Washing out Undergound Pollution
Full-text access may be available. Sign in or learn about subscription options.
pp. 344-347
by
Kazuyo Yoneda
,
Shinichi Tamura
,
Yoshinori Nishino
,
Kazuki Nakamura
,
Takio Shimosakon
,
Kyohei Shimada
,
Rong Long Wan
,
Kozo Okazaki
Papers
Improved EMD Steganography with Great Embedding Rate and High Embedding Efficiency
Full-text access may be available. Sign in or learn about subscription options.
pp. 348-352
by
Qu Zhiguo
,
Fu Yu
,
Niu Xinxin
,
Yang Yixian
,
Zhang Ru
Papers
Yet Another Friendly Progressive Visual Secret Sharing Scheme
Full-text access may be available. Sign in or learn about subscription options.
pp. 353-356
by
Tzung-Her Chen
,
Yao-Sheng Lee
Papers
Using Fano Plane and Image Centroids for Rotation, Scaling, or Translation Resistant Watermarking
Full-text access may be available. Sign in or learn about subscription options.
pp. 357-360
by
Zhi-Fang Yang
,
Chih-Jung Su
,
Ping-Chang Tseng
,
Chan-Ting Shu
Papers
An Embedding Technique Based upon Block Prediction and Code Cascading Shift
Full-text access may be available. Sign in or learn about subscription options.
pp. 361-364
by
Chin-Feng Lee
,
Jau-Ji Shen
,
Mei-Chun Chuang
Papers
A Scheme of Modulo-Based Capacity-improvement upon EMD Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 365-368
by
Hung-Min Sun
,
Chi-Yao Weng
,
Shiuh-Jeng Wang
Papers
A Novel Secure Data Hiding Scheme Using a Secret Reference Matrix
Full-text access may be available. Sign in or learn about subscription options.
pp. 369-373
by
Chi-Nan Lin
,
Chin-Chen Chang
,
Wei-Bin Lee
,
Jason Lin
Papers
Lossless Information Hiding Scheme Based on Predictive Coding
Full-text access may be available. Sign in or learn about subscription options.
pp. 374-377
by
Tzu-Chuen Lu
,
Cheng-Chun Huang
,
Siang-Ru Liao
Papers
A Schema for Multi-Signature Handling Based on Workflow Model
Full-text access may be available. Sign in or learn about subscription options.
pp. 378-381
by
Jin-Bao Liu
,
Zhi-Long Qiu
,
Hui Zhou
,
Bao-Hui Liu
,
Xia-Mu Niu
Papers
A Robust Watermarking Algorithm Based on Differential Energy and QIM for Uncompressed Video
Full-text access may be available. Sign in or learn about subscription options.
pp. 382-385
by
Zhaoqing Liu
,
Qiong Li
,
Shuai Guan
,
Xiyuan Peng
Papers
Image Object Detection and Tracking Implementation for Outdoor Scenes on an Embedded Soc Platform
Full-text access may be available. Sign in or learn about subscription options.
pp. 386-389
by
Wen-Kai Tsai
,
Ming-hwa Sheu
,
Ching-lung Su
,
Jun-jie Lin
,
Shau-Yin Tseng
Papers
Implementation and ESL Verification of New Earliest-Deadline-First Scheduler for Video Streaming over Wireless Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 390-393
by
Chao-Lieh Chen
,
Chien-Hao Lai
Showing 100 out of 332
Load More
Load All