Sciweavers

3852 search results - page 652 / 771
» Construction of Codes for Network Coding
Sort
View
123
Voted
DSN
2005
IEEE
15 years 10 months ago
Authenticated System Calls
System call monitoring is a technique for detecting and controlling compromised applications by checking at runtime that each system call conforms to a policy that specifies the ...
Mohan Rajagopalan, Matti A. Hiltunen, Trevor Jim, ...
134
Voted
ISM
2005
IEEE
88views Multimedia» more  ISM 2005»
15 years 10 months ago
Hybrid Bitrate/PSNR Control for H.264 Video Streaming to Roaming Users
In wireless communications, the available throughput depends on several parameters, like physical layer, base station distance, fading and interference. Users experience changes i...
Fabio De Vito, Federico Ridolfo, Juan Carlos De Ma...
MSWIM
2005
ACM
15 years 10 months ago
Trade-offs in bit-rate allocation for wireless video streaming
One of the central problems in video transmission over lossy channels is the choice of source and channel coding rates to allocate the available transmission rate optimally. In th...
Vladimir Vukadinovic, Gunnar Karlsson
IPSN
2005
Springer
15 years 10 months ago
Fading observation alignment via feedback
Abstract— In some remote sensing applications, the functional relationship between the source being observed and the sensor readings may not be known. Because of communication co...
Anand D. Sarwate, Michael Gastpar
131
Voted
MSWIM
2004
ACM
15 years 10 months ago
Speeding up the evaluation of multimedia streaming applications in MANETs using HMMs
Mobile ad-hoc networks (MANETs) present quite large packet loss bursts due to mobility. In this work we propose two models based on hidden Markov models for estimating packet arri...
Carlos Miguel Tavares Calafate, Pietro Manzoni, Ma...