Sciweavers

10044 search results - page 1934 / 2009
» Authentication in Wireless Networks
Sort
View
DATE
2006
IEEE
171views Hardware» more  DATE 2006»
15 years 10 months ago
4G applications, architectures, design methodology and tools for MPSoC
transistors the design of the SoC needs to be moved to a higher level of abstraction. We need to think in processors and interconnects rather than gates and wires. We discuss the n...
HICSS
2006
IEEE
134views Biometrics» more  HICSS 2006»
15 years 10 months ago
Differentiated Priority Scheduling and Adaptive Segmentation for Bluetooth Piconets
Bluetooth is a wireless communication technology, aimed at supporting connectivity among close proximity mobile devices. Bluetooth enables the design of low-power, low-cost, and s...
Jyothsna Kalvala, Gergely V. Záruba
ICMCS
2006
IEEE
97views Multimedia» more  ICMCS 2006»
15 years 10 months ago
Utilizing SSR Indications for Improved Video Communication in Presence of 802.11B Residue Errors
Radio hardware used for the reception of 802.11b frames is capable of associating a Signal to Silence Ratio (SSR) with each received frame. If a received frame is corrupted, then ...
Shirish S. Karande, Utpal Parrikar, Kiran Misra, H...
INFOCOM
2006
IEEE
15 years 10 months ago
Optimizing Caching Policy for Loss Recovery in Reliable Multicast
— In reliable multicast, data packets can be cached at some nodes such as repair servers for future possible retransmission in loss recovery schemes. How to cache packets to opti...
Feng Xie, Gang Feng, Xun Yang
ISM
2006
IEEE
105views Multimedia» more  ISM 2006»
15 years 10 months ago
MPEG-21 Based Temporal Adaptation of Live H.264 Video
The diversity of devices in both wired and wireless networks via which multimedia contents are desired to be accessed and interacted with has grown significantly. Applications lik...
Razib Iqbal, Shervin Shirmohammadi, Chris Joslin
« Prev « First page 1934 / 2009 Last » Next »