Sciweavers

WOWMOM
2006
ACM
195views Multimedia» more  WOWMOM 2006»
13 years 10 months ago
Can I Add a Secure VoIP Call?
— Voice over IP is a major trend in applications for wireless networks, but even so it is not immune to the risks usually related with IP networks. Proposed solutions for VoIP se...
Arlen Nascimento, Alexandre Passito, Edjair de Sou...
WOWMOM
2006
ACM
111views Multimedia» more  WOWMOM 2006»
13 years 10 months ago
An Experimental Testbed and Methodology for Characterizing IEEE 802.11 Network Cards
— It has been observed that IEEE 802.11 commercial cards produced by different vendors show a different behavior in terms of perceived throughput or access delay. Performance dif...
Antonio Di Stefano, Giovanni Terrazzino, Luca Scal...
WOWMOM
2006
ACM
191views Multimedia» more  WOWMOM 2006»
13 years 10 months ago
Privacy Preserving Trust Authorization Framework Using XACML
: Nowadays many organisations share sensitive services through open network systems and this raises the need for an authorization framework that can interoperate even when the part...
Uche M. Mbanaso, G. S. Cooper, David W. Chadwick, ...
WOWMOM
2006
ACM
94views Multimedia» more  WOWMOM 2006»
13 years 10 months ago
Performance Analysis and Enhancement of the Next Generation Cellular Networks
— As more and more wireless subscribers access the Internet through cellular networks, Internet data traffic, which is known to be long range dependent (LRD), will soon dominate...
Xiang Yu, Chunming Qiao, Xin Wang, Dahai Xu
WOWMOM
2006
ACM
108views Multimedia» more  WOWMOM 2006»
13 years 10 months ago
Multimedia Correlation Analysis in Unstructured Peer-to-Peer Networks
Recent years saw the rapid development of peer-topeer (P2P) networks in a great variety of applications. However, similarity-based k-nearest-neighbor retrieval (k-NN) is still a c...
Bo Yang, Ali R. Hurson, Yu Jiao, Thomas E. Potok
WOWMOM
2006
ACM
130views Multimedia» more  WOWMOM 2006»
13 years 10 months ago
Power Control in Multihop CSMA
—This paper aims at improving the power efficiency of the CSMA/CA protocol for transmission of multimedia information over multihop wireless channels. Using a distance dependent ...
Bo Yan, Hamid Gharavi
WOWMOM
2006
ACM
122views Multimedia» more  WOWMOM 2006»
13 years 10 months ago
Multiple-Access Insights from Bounds on Sensor Localization
In this paper, we build on known bounds on localization in sensor networks and provide new insights that can be used in multiple-access design from a localization perspective. Spe...
Swaroop Venkatesh, R. Michael Buehrer
WOWMOM
2006
ACM
120views Multimedia» more  WOWMOM 2006»
13 years 10 months ago
Self-Sizing of Clustered Databases
Distributed software environments are increasingly difficult to manage. This paper presents a middleware for the development of self-manageable and autonomic systems. Preliminary ...
Christophe Taton, Sara Bouchenak, Noel De Palma, D...
WOWMOM
2006
ACM
128views Multimedia» more  WOWMOM 2006»
13 years 10 months ago
Enabling Engineering Document in Mobile Computing Environment
A multi-level hierarchical content organization and on-demand delivery framework is presented in this paper. This framework enables engineering content representation and exchange...
Xiaoyong Su, Chi-Cheng Peter Chu, B. S. Prabhu, Ra...