Sciweavers

2826 search results - page 144 / 566
» A resource-based analysis of IT sourcing
Sort
View
GLOBECOM
2006
IEEE
15 years 7 months ago
Wormhole Attack in Wireless Ad Hoc Networks: Analysis and Countermeasure
— The wormhole attack is one of the most severe security attacks in wireless ad hoc networks. In this paper, we analyze the effect of the wormhole attack in shortest path routing...
Majid Khabbazian, Hugues Mercier, Vijay K. Bhargav...
ICMCS
2006
IEEE
219views Multimedia» more  ICMCS 2006»
15 years 7 months ago
Analysis of Multi-User Congestion Control for Video Streaming Over Wireless Networks
When multiple video sources are live-encoded and transmitted over a common wireless network, each stream needs to adapt its encoding parameters to wireless channel fluctuations, ...
Xiaoqing Zhu, Bernd Girod
ISMAR
2006
IEEE
15 years 7 months ago
Performance analysis of an outdoor augmented reality tracking system that relies upon a few mobile beacons
We describe and evaluate a new tracking concept for outdoor Augmented Reality. A few mobile beacons added to the environment correct errors in head-worn inertial and GPS sensors. ...
Ronald Azuma, Howard Neely, Mike Daily, Jon Leonar...
ASPDAC
2006
ACM
140views Hardware» more  ASPDAC 2006»
15 years 7 months ago
Analysis and optimization of gate leakage current of power gating circuits
— Power gating is widely accepted as an efficient way to suppress subthreshold leakage current. Yet, it suffers from gate leakage current, which grows very fast with scaling dow...
Hyung-Ock Kim, Youngsoo Shin
SAC
2005
ACM
15 years 7 months ago
Adaptation point analysis for computation migration/checkpointing
Finding the appropriate location of adaptation points for computation migration/checkpointing is critical since the distance between two consecutive adaptation points determines t...
Yanqing Ji, Hai Jiang, Vipin Chaudhary