Sciweavers

22193 search results - page 4230 / 4439
» Multiple Restricted Multiplication
Sort
View
COMCOM
2010
129views more  COMCOM 2010»
15 years 3 months ago
Fast certificate-based authentication scheme in multi-operator maintained wireless mesh networks
In this paper, we consider QoS aware mesh networks that are maintained by multiple operators and they cooperate in the provision of networking services to the mesh clients. In ord...
Levente Buttyán, László D&oac...
CE
2008
95views more  CE 2008»
15 years 3 months ago
Enabling teachers to explore grade patterns to identify individual needs and promote fairer student assessment
Exploring student test, homework, and other assessment scores is a challenge for most teachers, especially when attempting to identify cross-assessment weaknesses and produce fina...
Sorelle A. Friedler, Yee Lin Tan, Nir J. Peer, Ben...
117
Voted
CGF
2008
104views more  CGF 2008»
15 years 3 months ago
Shrinkability Maps for Content-Aware Video Resizing
A novel method is given for content-aware video resizing, i.e. targeting video to a new resolution (which may involve aspect ratio change) from the original. We precompute a per-p...
Yi-Fei Zhang, Shi-Min Hu, Ralph R. Martin
CORR
2010
Springer
146views Education» more  CORR 2010»
15 years 3 months ago
Multicast Outage Probability and Transmission Capacity of Multihop Wireless Networks
Multicast transmission, wherein the same packet must be delivered to multiple receivers, is an important aspect of sensor and tactical networks and has several distinctive traits ...
Chun-Hung Liu, Jeffrey G. Andrews
CN
2008
192views more  CN 2008»
15 years 3 months ago
Research on multicast routing protocols for mobile ad-hoc networks
A mobile ad-hoc network (MANET) is composed of mobile nodes without any infrastructure. Mobile nodes self-organize to form a network over radio links. The goal of MANETs is to ext...
Junhai Luo, Xue Liu, Danxia Ye
« Prev « First page 4230 / 4439 Last » Next »