Sciweavers

1320 search results - page 128 / 264
» Constraint Based Network Adaptation for Ubiquitous Applicati...
Sort
View
101
Voted
CCS
2001
ACM
15 years 5 months ago
The performance of public key-enabled kerberos authentication in mobile computing applications
Authenticating mobile computing users can require a significant amount of processing and communications resources— particularly when protocols based on public key encryption are...
Alan Harbitter, Daniel A. Menascé
INFOCOM
2003
IEEE
15 years 6 months ago
Measurement-Based Optimization Techniques for Bandwidth-Demanding Peer-to-Peer Systems
— Measurement-based optimization is one important strategy to improve the performance of bandwidth-demanding peer-to-peer systems. However, to date, we have little quantitative k...
T. S. Eugene Ng, Yang-Hua Chu, Sanjay G. Rao, Kunw...
85
Voted
DATE
2006
IEEE
171views Hardware» more  DATE 2006»
15 years 6 months ago
Dynamic bit-width adaptation in DCT: image quality versus computation energy trade-off
We present a dynamic bit-width adaptation scheme in DCT applications for efficient trade-off between image quality and computation energy. Based on sensitivity differences of 64 ...
Jongsun Park, Jung Hwan Choi, Kaushik Roy
92
Voted
MDM
2007
Springer
15 years 7 months ago
State-Filters for Enhanced Filtering in Sensor-Based Publish/Subscribe Systems
—Publish/Subscribe systems have been extensively studied in the context of distributed information-based systems, and have proven scalable in information-dissemination for many d...
Salman Taherian, Jean Bacon
86
Voted
CN
2007
74views more  CN 2007»
15 years 25 days ago
SSVP: A congestion control scheme for real-time video streaming
In this paper, we present a new end-to-end protocol, namely Scalable Streaming Video Protocol (SSVP), which operates on top of UDP and is optimized for unicast video streaming app...
Panagiotis Papadimitriou, Vassilis Tsaoussidis