Sciweavers

2061 search results - page 360 / 413
» Authorization for Metacomputing Applications
Sort
View
101
Voted
ICC
2008
IEEE
110views Communications» more  ICC 2008»
15 years 7 months ago
Antenna Selection for Next Generation IEEE 802.16 Mobile Stations
The IEEE 802.16/WiMAX standard has fully embraced multi-antenna technology and can, thus, deliver robust and high transmission rates and higher system capacity. Nevertheless, due ...
Chun Nie, Zhifeng Tao, Neelesh B. Mehta, Andreas F...
ICC
2008
IEEE
115views Communications» more  ICC 2008»
15 years 7 months ago
On the Performance of Linear Least-Squares Estimation in Wireless Positioning Systems
A common technique for wireless positioning is to estimate time-of-arrivals (TOAs) of signals traveling between a target node and a number of reference nodes, and then to determin...
Sinan Gezici, Ismail Güvenç, Zafer Sah...
99
Voted
ICIP
2008
IEEE
15 years 7 months ago
Edge-based directional fuzzy filter for compression artifact reduction in JPEG images
We propose a novel method to reduce both blocking and ringing artifacts in compressed images and videos. Based on the directional characteristics of ringing artifacts along edges,...
Dung Trung Vo, Truong Q. Nguyen, Sehoon Yea, Antho...
113
Voted
IPPS
2008
IEEE
15 years 7 months ago
The design of a versatile, secure P2PSIP communications architecture for the public internet
Communications systems, encompassing VoIP, IM, and other personal media, present different challenges for P2P environments than other P2P applications. In particular, reliable com...
David A. Bryan, Bruce Lowekamp, Marcia Zangrilli
107
Voted
MICRO
2008
IEEE
124views Hardware» more  MICRO 2008»
15 years 7 months ago
SHARK: Architectural support for autonomic protection against stealth by rootkit exploits
Rootkits have become a growing concern in cyber-security. Typically, they exploit kernel vulnerabilities to gain root privileges of a system and conceal malware’s activities fro...
Vikas R. Vasisht, Hsien-Hsin S. Lee