Robust video streaming over error-prone wireless LANs (WLANs) poses many challenges. In this paper, we propose a timestamp-based content-aware adaptive retry (CAR) mechanism for M...
In this paper we present results of experimental investigation into the performance of three audio codecs (ITU-T G.711, G.723.1, and G.729A) under varying load conditions on a Voi...
abstract February 6, 2004 Security protocols typically employ an authentication phase followed by a protected data exchange. In some cases, such TLS, these two phases are tightly ...
This paper presents the e-SUIT, a wearable computer incorporated in a traditional business suit. A key feature of the system is an array of input/output devices integrated into th...
Aaron Toney, Barrie Mulley, Bruce H. Thomas, Wayne...
This article proposes a simple key management protocol for the distribution of shared session keys in IEEE 802.11 wireless LANs. For this purpose an individual key for each user i...