Sciweavers

1692 search results - page 315 / 339
» Evaluation of Security Mechanisms in Wireless Sensor Network...
Sort
View
WOWMOM
2005
ACM
240views Multimedia» more  WOWMOM 2005»
15 years 5 months ago
An Adaptive Routing Protocol for Ad Hoc Peer-to-Peer Networks
Ad hoc networks represent a key factor in the evolution of wireless communications. These networks typically consist of equal nodes that communicate without central control, inter...
Luca Gatani, Giuseppe Lo Re, Salvatore Gaglio
WIOPT
2006
IEEE
15 years 5 months ago
Flow-level stability of channel-aware scheduling algorithms
— Channel-aware scheduling strategies provide an effective mechanism for improving the throughput performance in wireless data networks by exploiting channel fluctuations. The p...
Sem C. Borst, Matthieu Jonckheere
VTC
2010
IEEE
153views Communications» more  VTC 2010»
14 years 10 months ago
H.264 Wireless Video Telephony Using Iteratively-Detected Binary Self-Concatenated Coding
— In this contribution we propose a robust H.264 coded wireless video transmission scheme using iteratively decoded self-concatenated convolutional coding (SECCC). The proposed S...
Nasruminallah, Muhammad Fasih Uddin Butt, Soon Xin...
IEEEARES
2007
IEEE
15 years 6 months ago
Reputation Management Survey
Electronic markets, distributed peer-to-peer applications and other forms of online collaboration are all based on mutual trust, which enables transacting peers to overcome the un...
Sini Ruohomaa, Lea Kutvonen, Eleni Koutrouli
SECON
2008
IEEE
15 years 6 months ago
Fast Exclusion of Errant Devices from Vehicular Networks
—Vehicular networks, in which cars communicate wirelessly to exchange information on traffic conditions, offer a promising way to improve road safety. Yet ensuring the correct f...
Tyler Moore, Maxim Raya, Jolyon Clulow, Panagiotis...