Sciweavers

644 search results - page 87 / 129
» Adaptive security protocol selection for mobile computing
Sort
View
SIGCOMM
2009
ACM
15 years 6 months ago
Cross-layer wireless bit rate adaptation
This paper presents SoftRate, a wireless bit rate adaptation protocol that is responsive to rapidly varying channel conditions. Unlike previous work that uses either frame recepti...
Mythili Vutukuru, Hari Balakrishnan, Kyle Jamieson
ICPR
2008
IEEE
16 years 1 months ago
Towards mobile authentication using dynamic signature verification: Useful features and performance evaluation
The proliferation of handheld devices such as PDAs and smartphones represents a new scenario for automatic signature verification. Traditionally, research on signature verificatio...
Marcos Martinez-Diaz, Julian Fiérrez-Aguila...
ICDIM
2007
IEEE
15 years 6 months ago
Optimized contextual discovery of Web Services for Devices
Due to more and more mobile computers moving among smart and communicating devices in our everyday life, we observe the emergence of new constraints in software design. Indeed, de...
Nicolas Bussiere, Daniel Cheung-Foo-Wo, Vincent Ho...
ICNP
2000
IEEE
15 years 4 months ago
An Image Transport Protocol for the Internet
Images account for a significant and growing fraction of Web downloads. The traditional approach to transporting images uses TCP, which provides a generic reliable, in-order eam ...
Suchitra Raman, Hari Balakrishnan, Murari Srinivas...
MSWIM
2005
ACM
15 years 5 months ago
A swarm intelligent multi-path routing for multimedia traffic over mobile ad hoc networks
In the last few years, the advance of multimedia applications has prompted researchers to undertake the task of routing multimedia data through Manet. This task is rather difficul...
Saida Ziane, Abdelhamid Mellouk