Sciweavers

3343 search results - page 580 / 669
» Network Objects
Sort
View
HASE
2008
IEEE
15 years 6 months ago
Low Cost Secure Computation for the General Client-Server Computation Model
Due to the large number of attacks on open networks, information theft becomes a more and more severe problem. Secure computation can offer highly assured confidentiality protecti...
Liangliang Xiao, I-Ling Yen, Farokh B. Bastani
ICC
2008
IEEE
116views Communications» more  ICC 2008»
15 years 6 months ago
Haptic Data Transmission Based on the Prediction and Compression
—In this paper, we present a floating-point compression method using position prediction for haptic data transmission. The main objective of our work is to reduce the size of ban...
Yonghee You, Mee Young Sung
ICC
2008
IEEE
169views Communications» more  ICC 2008»
15 years 6 months ago
Optimality of Myopic Sensing in Multi-Channel Opportunistic Access
—We consider opportunistic communications over multiple channels where the state (“good” or “bad”) of each channel evolves as independent and identically distributed Mark...
Tara Javidi, Bhaskar Krishnamachari, Qing Zhao, Mi...
ICCCN
2008
IEEE
15 years 6 months ago
Localized Access Point Association in Wireless LANs with Bounded Approximation Ratio
— The current access point (AP) association schemes in wireless LANs, such as IEEE 802.11, cause an unbalanced load which reduces the performance of both the entire network and i...
Mingming Lu, Jie Wu
87
Voted
ICDCS
2008
IEEE
15 years 6 months ago
Quality of Trilateration: Confidence Based Iterative Localization
—The proliferation of wireless and mobile devices has fostered the demand for context-aware applications, in which location is one of the most significant contexts. Multilaterati...
Zheng Yang, Yunhao Liu