Sciweavers

644 search results - page 121 / 129
» Adaptive security protocol selection for mobile computing
Sort
View
81
Voted
DAGSTUHL
2006
14 years 11 months ago
Using Quantum Oblivious Transfer to Cheat Sensitive Quantum Bit Commitment
It is well known that unconditionally secure bit commitment is impossible even in the quantum world. In this paper a weak variant of quantum bit commitment, introduced independent...
Andreas Jakoby, Maciej Liskiewicz, Aleksander Madr...
PERCOM
2010
ACM
14 years 8 months ago
ReSCo: A middleware component for Reliable Service Composition in pervasive systems
Abstract—Service composition schemes create high-level application services by combining several basic services. Service composition schemes for dynamic, open systems, such as th...
Brent Lagesse, Mohan Kumar, Matthew Wright
IWQOS
2004
Springer
15 years 2 months ago
On quality-of-service and energy consumption tradeoffs in FEC-encoded audio streaming
This paper addresses the energy consumption of forward error correction (FEC) protocols as used to improve quality-of-service (QoS) for wireless computing devices. The paper also ...
Zhinan Zhou, Philip K. McKinley, Seyed Masoud Sadj...
80
Voted
WIMOB
2007
IEEE
15 years 3 months ago
Software Solutions for Converting a MIMO-OFDM Channel into Multiple SISO-OFDM Channels
We present a software approach for MIMO-OFDM wireless communication technology. We first show that complex matrix operations like Singular-Value Decomposition (SVD), diagonalizat...
Mihai Sima, Murugappan Senthilvelan, Daniel Iancu,...
CHI
2008
ACM
15 years 10 months ago
Temporal trajectories in shared interactive narratives
Temporal trajectories can represent the complex mappings between story time and clock time that are to be found in shared interactive narratives such as computer games and interac...
Steve Benford, Gabriella Giannachi