Sciweavers

1170 search results - page 17 / 234
» Between ends and fibers
Sort
View
ICIP
2006
IEEE
15 years 11 months ago
End-to-End Rate-Distortion Optimized Motion Estimation
An end-to-end rate-distortion optimized motion estimation method for robust video coding in lossy networks is proposed. In this method the expected reconstructed distortion after ...
Shuai Wan, Ebroul Izquierdo, Fuzheng Yang, Yilin C...
GLOBECOM
2006
IEEE
15 years 3 months ago
Performance of End-to-End Mobility Management in Satellite IP Networks
— IETF has developed Mobile IP to support mobility of IP hosts at the network layer. The National Aeronautics and Space Administration has implemented Mobile IP to handle handove...
Pulak K. Chowdhury, Mohammed Atiquzzaman, William ...
IEEESCC
2006
IEEE
15 years 3 months ago
Memory Servers: A Scope of SOA for High-End Computing
The expanding gap between microprocessor and disk performance has initiated new techniques of providing memory as a service in high-end computing (HEC). Although the processor and...
Surendra Byna, Xian-He Sun, Ryan Nakhoul
WEA
2005
Springer
105views Algorithms» more  WEA 2005»
15 years 3 months ago
Inferring AS Relationships: Dead End or Lively Beginning?
Recent techniques for inferring business relationships between ASs [3, 8] have yielded maps that have extremely few invalid BGP paths in the terminology of Gao [9]. However, some ...
Xenofontas A. Dimitropoulos, Dmitri V. Krioukov, B...
SPW
2004
Springer
15 years 2 months ago
BLIND: A Complete Identity Protection Framework for End-Points
In this paper, we present a security framework that provides identity protection against active and passive attacks for end-points. The framework is based on a two-round-trip authe...
Jukka Ylitalo, Pekka Nikander