Sciweavers

475 search results - page 79 / 95
» Evaluation of an Adaptive Transport Protocol
Sort
View
MOBISYS
2011
ACM
14 years 16 days ago
Odessa: enabling interactive perception applications on mobile devices
Resource constrained mobile devices need to leverage computation on nearby servers to run responsive applications that recognize objects, people, or gestures from real-time video....
Moo-Ryong Ra, Anmol Sheth, Lily B. Mummert, Padman...
80
Voted
JSAC
2010
99views more  JSAC 2010»
14 years 8 months ago
Robust wireless video streaming using hybrid spatial/temporal retransmission
—Bandwidth demands and timing constraints are two major challenges for wireless video streaming applications. In this paper, we present a hybrid spatial/temporal retransmission p...
Mei-Hsuan Lu, Peter Steenkiste, Tsuhan Chen
JSAC
2010
142views more  JSAC 2010»
14 years 4 months ago
Handling inelastic traffic in wireless sensor networks
The capabilities of sensor networking devices are increasing at a rapid pace. It is therefore not impractical to assume that future sensing operations will involve real time (inela...
Jiong Jin, Avinash Sridharan, Bhaskar Krishnamacha...
71
Voted
FAST
2008
15 years 10 hour ago
TierStore: A Distributed Filesystem for Challenged Networks in Developing Regions
TierStore is a distributed filesystem that simplifies the development and deployment of applications in challenged network environments, such as those in developing regions. For e...
Michael J. Demmer, Bowei Du, Eric A. Brewer
IMC
2007
ACM
14 years 11 months ago
Cryptographic strength of ssl/tls servers: current and recent practices
The Secure Socket Layer (SSL) and its variant, Transport Layer Security (TLS), are used toward ensuring server security. In this paper, we characterize the cryptographic strength ...
Homin K. Lee, Tal Malkin, Erich M. Nahum