Sciweavers

464 search results - page 91 / 93
» Authorisation Using Attributes from Multiple Authorities
Sort
View
COMPSAC
2002
IEEE
15 years 2 months ago
Design and Implementation of a Network Application Architecture for Thin Clients
This paper explores the issues and the techniques of enabling multimedia applications for the thin client computing. A prototype of a video communication system based on H.323 fam...
Chia-Chen Kuo, Ping Ting, Ming-Syan Chen, Jeng-Chu...
TWC
2008
141views more  TWC 2008»
14 years 9 months ago
Progressive Accumulative Routing: Fundamental Concepts and Protocol
This paper considers a multi-hop network in which relay nodes cooperate to minimize the total energy consumed in transmitting a (unicast) packet from a source to a destination. We...
Raymond Yim, Neelesh B. Mehta, Andreas F. Molisch,...
MTA
2007
140views more  MTA 2007»
14 years 9 months ago
Motion mapping and mode decision for MPEG-2 to H.264/AVC transcoding
This paper describes novel transcoding techniques aimed for low-complexity MPEG-2 to H.264/AVC transcoding. An important application for this type of conversion is efficient stor...
Jun Xin, Jianjun Li, Anthony Vetro, Shun-ichi Seki...
CHI
2005
ACM
15 years 10 months ago
Evaluating navigational surrogate formats with divergent browsing tasks
Navigational surrogates are representations that stand for information resources within search engine result sets, e-commerce sites, and digital libraries. They also form the basi...
Andruid Kerne, Steven M. Smith, Hyun Choi, Ross Gr...
SP
2005
IEEE
156views Security Privacy» more  SP 2005»
15 years 3 months ago
Distributed Detection of Node Replication Attacks in Sensor Networks
The low-cost, off-the-shelf hardware components in unshielded sensor-network nodes leave them vulnerable to compromise. With little effort, an adversary may capture nodes, analyze...
Bryan Parno, Adrian Perrig, Virgil D. Gligor