Sciweavers

5056 search results - page 441 / 1012
» Network Coding Theory
Sort
View
NETWORK
2006
177views more  NETWORK 2006»
15 years 4 months ago
Jamming sensor networks: attack and defense strategies
Wireless sensor networks are built upon a shared medium that makes it easy for adversaries to conduct radio interference, or jamming, attacks that effectively cause a denial of se...
Wenyuan Xu, Ke Ma, Wade Trappe, Yanyong Zhang
PPPJ
2009
ACM
15 years 9 months ago
SlimVM: a small footprint Java virtual machine for connected embedded systems
The usage of cellular phones, PDAs, and other mobile devices has increased dramatically over the past ten years. Java is targeted to be one of the most popular execution environme...
Christoph Kerschbaumer, Gregor Wagner, Christian W...
STORAGESS
2005
ACM
15 years 10 months ago
Hydra: a platform for survivable and secure data storage systems
This paper introduces Hydra, a platform that we are developing for highly survivable and secure data storage systems that distribute information over networks and adapt timely to ...
Lihao Xu
UCS
2004
Springer
15 years 10 months ago
Real-World Interaction with Camera Phones
With the integration of cameras, mobile phones have evolved into networked personal image capture devices. Camera-phones can perform image processing tasks on the device itself an...
Michael Rohs
ICIP
2003
IEEE
15 years 10 months ago
Fast motion estimation with modified diamond search for variable motion block sizes
The adaptive and powerful coding schemes in H.264 provide significant coding efficiency and some additional merits like error resilience and network friendliness. In spite of thes...
Woong Il Choi, Byeungwoo Jeon, Jechang Jeong