Sciweavers

8655 search results - page 1297 / 1731
» Challenges for Trusted Computing
Sort
View
HICSS
2007
IEEE
118views Biometrics» more  HICSS 2007»
15 years 10 months ago
Is the Open Way a Better Way? Digital Forensics Using Open Source Tools
The subject of digital forensics can be quite challenging. Digital forensics is in its infancy and teaching digital forensics includes the techniques as well as the tools that ass...
Dan Manson, Anna Carlin, Steve Ramos, Alain Gyger,...
ICC
2007
IEEE
145views Communications» more  ICC 2007»
15 years 10 months ago
Predicting User-Perceived Quality Ratings from Streaming Media Data
Abstract—Media stream quality is highly dependent on underlying network conditions, but identifying scalable, unambiguous metrics to discern the user-perceived quality of a media...
Amy Csizmar Dalal, David R. Musicant, Jamie F. Ols...
ICC
2007
IEEE
122views Communications» more  ICC 2007»
15 years 10 months ago
Interactive Error Control for Mobile Video Telephony
—Error robust video communication for hand-held devices is a delicate task because of limited computational resources and hostile channel conditions in mobile environments. The l...
Waqar Zia, Tauseef Afzal, Wen Xu, Günther Lie...
ICC
2007
IEEE
15 years 10 months ago
Channel Estimation Considerations for Iterative Decoding in Wireless Communications
—The time-varying nature of wireless channels poses a challenge for using soft-decision iterative decoders on such channels. Even if the channel gain is perfectly known to the re...
Pirouz Zarrinkhat, Masoud Ardakani, Raman Yazdani
ICCCN
2007
IEEE
15 years 10 months ago
Utility-Based Routing in Communication Networks with Unstable Links
Abstract—Traditional Dijkstra and Bellman-Ford routing algorithms can only provide the best route to each destination based on a fixed link cost model. We propose a utility-base...
Mingming Lu, Jie Wu
« Prev « First page 1297 / 1731 Last » Next »