• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 6,183
Next 10 →

Error Control and Concealment for Video Communication -- A Review

by Yao Wang, Qin-fan Zhu - PROCEEDINGS OF THE IEEE , 1998
"... The problem of error control and concealment in video communication is becoming increasingly important because of the growing interest in video delivery over unreliable channels such as wireless networks and the Internet. This paper reviews the techniques that have been developed for error control a ..."
Abstract - Cited by 438 (13 self) - Add to MetaCart
and concealment in the past ten to fifteen years. These techniques are described in three categories according to the roles that the encoder and decoder play in the underlying approaches. Forward error concealment includes methods that add redundancy at the source end to enhance error resilience of the coded bit

Least angle regression

by Bradley Efron, Trevor Hastie, Iain Johnstone, Robert Tibshirani , 2004
"... The purpose of model selection algorithms such as All Subsets, Forward Selection and Backward Elimination is to choose a linear model on the basis of the same set of data to which the model will be applied. Typically we have available a large collection of possible covariates from which we hope to s ..."
Abstract - Cited by 1326 (37 self) - Add to MetaCart
The purpose of model selection algorithms such as All Subsets, Forward Selection and Backward Elimination is to choose a linear model on the basis of the same set of data to which the model will be applied. Typically we have available a large collection of possible covariates from which we hope

Effective Erasure Codes for Reliable Computer Communication Protocols

by Luigi Rizzo , 1997
"... Reliable communication protocols require that all the intended recipients of a message receive the message intact. Automatic Repeat reQuest (ARQ) techniques are used in unicast protocols, but they do not scale well to multicast protocols with large groups of receivers, since segment losses tend to b ..."
Abstract - Cited by 470 (14 self) - Add to MetaCart
to become uncorrelated thus greatly reducing the effectiveness of retransmissions. In such cases, Forward Error Correction (FEC) techniques can be used, consisting in the transmission of redundant packets (based on error correcting codes) to allow the receivers to recover from independent packet losses

The effects of feedback interventions on performance: A historical review, a meta-analysis, and a preliminary feedback intervention theory

by Avraham N. Kluger, Angelo Denisi - Psychological Bulletin , 1996
"... Since the beginning of the century, feedback interventions (FIs) produced negative—but largely ignored—effects on performance. A meta-analysis (607 effect sizes; 23,663 observations) suggests that FIs improved performance on average (d =.41) but that over '/3 of the FIs decreased perfor-mance. ..."
Abstract - Cited by 463 (1 self) - Add to MetaCart
-mance. This finding cannot be explained by sampling error, feedback sign, or existing theories. The authors proposed a preliminary FI theory (FIT) and tested it with moderator analyses. The central assumption of FIT is that FIs change the locus of attention among 3 general and hierarchically organized levels

The forward discount anomaly and the risk premium: A survey of recent evidence

by Charles Engel - JOURNAL OF EMPIRICAL FINANCE , 1996
"... Forward exchange rate unbiasedness is rejected in tests from the current floating exchange rate era. This paper surveys advances in this area since the publication of Hodrick's (1987) survey. It documents that the change in the future exchange rate is generally negatively related to the forward ..."
Abstract - Cited by 400 (11 self) - Add to MetaCart
to the forward discount. Properties of the expected forward forecast error are reviewed. Issues such as the relation of uncovered interest parity to real interest parity, and the implications of uncovered interest parity for cointegration of various quantities are discussed. The modeling and testing for risk

A Fuzzy Commitment Scheme

by Ari Juels, Martin Wattenberg - ACM CCS'99 , 1999
"... We combine well-known techniques from the areas of errorcorrecting codes and cryptography to achieve a new type of cryptographic primitive that we refer to as a fuzzy commitment scheme. Like a conventional cryptographic commitment scheme, our fuzzy commitment scheme is both concealing and binding: i ..."
Abstract - Cited by 344 (1 self) - Add to MetaCart
We combine well-known techniques from the areas of errorcorrecting codes and cryptography to achieve a new type of cryptographic primitive that we refer to as a fuzzy commitment scheme. Like a conventional cryptographic commitment scheme, our fuzzy commitment scheme is both concealing and binding

Parity-Based Loss Recovery for Reliable Multicast Transmission

by Jörg Nonnenmacher, Ernst Biersack, Don Towsley
"... We investigate how FEC (Forward Error Correction) can be combined with ARQ (Automatic Repeat Request) to achieve scalable reliable multicast transmission. We consider the two scenarios where FEC is introduced as a transparent layer underneath a reliable multicast layer that uses ARQ, and where FEC a ..."
Abstract - Cited by 335 (19 self) - Add to MetaCart
We investigate how FEC (Forward Error Correction) can be combined with ARQ (Automatic Repeat Request) to achieve scalable reliable multicast transmission. We consider the two scenarios where FEC is introduced as a transparent layer underneath a reliable multicast layer that uses ARQ, and where FEC

Matching as Nonparametric Preprocessing for Reducing Model Dependence

by Daniel E. Ho, Kosuke Imai, Gary King, Elizabeth A. Stuart - in Parametric Causal Inference,” Political Analysis , 2007
"... Although published works rarely include causal estimates from more than a few model specifications, authors usually choose the presented estimates from numerous trial runs readers never see. Given the often large variation in estimates across choices of control variables, functional forms, and other ..."
Abstract - Cited by 334 (46 self) - Add to MetaCart
or even define statistical properties like unbiasedness or mean squared error when no unique model or estimator even exists? Matching methods, which offer the promise of causal inference with fewer assumptions, constitute one possible way forward, but crucial results in this fast-growing methodological

concealment

by Ivan V. Bajić, John W. Woods
"... video streaming with channel coding and error ..."
Abstract - Add to MetaCart
video streaming with channel coding and error

An Error Concealment Algorithm for Streaming Video

by S. Belfiore, M. Grangetto, E. Magli, G. Olmo - IEEE International Conference on Image Processing (ICIP , 2003
"... A known problem in video streaming is that loss of a packet usually results into loss of a whole video frame. In this paper we propose an error concealment algorithm specifically designed to handle this sort of losses. The technique exploits information in a few past frames (namely the motion vector ..."
Abstract - Cited by 6 (0 self) - Add to MetaCart
A known problem in video streaming is that loss of a packet usually results into loss of a whole video frame. In this paper we propose an error concealment algorithm specifically designed to handle this sort of losses. The technique exploits information in a few past frames (namely the motion
Next 10 →
Results 1 - 10 of 6,183
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University