Sciweavers

1003 search results - page 196 / 201
» Extending the Adaptability of Reference Models
Sort
View
MOBISYS
2004
ACM
15 years 9 months ago
NWSLite: A Light-Weight Prediction Utility for Mobile Devices
Computation off-loading, i.e., remote execution, has been shown to be effective for extending the computational power and battery life of resource-restricted devices, e.g., hand-h...
Selim Gurun, Chandra Krintz, Richard Wolski
VTC
2008
IEEE
137views Communications» more  VTC 2008»
15 years 3 months ago
A Multi-Hop Polling Service with Bandwidth Request Aggregation in IEEE 802.16j Networks
— The IEEE 802.16j protocol for a multi-hop relay (MMR) WiMAX network is being developed to increase data rates and extend service coverage as an enhancement of existing WiMAX st...
Chun Nie, Thanasis Korakis, Shivendra S. Panwar
SACI
2007
IEEE
15 years 3 months ago
Geometric Theory and Control of Linear Parameter Varying Systems
: Linear Parameter Varying(LPV) systems appear in a form of LTI state space representations where the elements of the A(ρ), B(ρ), C(ρ) matrices can depend on an unknown but at a...
Jozsef Bokor
MMSEC
2006
ACM
231views Multimedia» more  MMSEC 2006»
15 years 3 months ago
JPEG2000-based secure image authentication
We present an efficient JPEG2000-based image authentication scheme, which is robust to JPEG compression and other allowed signal processing operations. Positive wavelet-based wate...
Mathias Schlauweg, Dima Pröfrock, Erika M&uum...
PKC
2004
Springer
106views Cryptology» more  PKC 2004»
15 years 2 months ago
On the Security of Multiple Encryption or CCA-security+CCA-security=CCA-security?
In a practical system, a message is often encrypted more than once by different encryptions, here called multiple encryption, to enhance its security. Additionally, new features ...
Rui Zhang 0002, Goichiro Hanaoka, Junji Shikata, H...