Sciweavers

533 search results - page 84 / 107
» On security-aware transmission scheduling
Sort
View
65
Voted
ICIP
2003
IEEE
15 years 11 months ago
On the scalability of an image transcoding proxy server
Image transcoding proxies are used to improve Web browsing over low bandwidth networks by adapting content-rich web images to bandwidth-constrained clients. Such transcoding proxi...
Anubhav Savant, Nasir D. Memon, Torsten Suel
GLOBECOM
2009
IEEE
15 years 4 months ago
Optimal Resource Allocation in the OFDMA Downlink with Feedback of Buffer State Information
—With the advent of new applications, one of the primary applications supported in downlink cellular systems is streaming video. QoS for streaming video entails data transmission...
Rajiv Agarwal, John M. Cioffi
CDC
2008
IEEE
187views Control Systems» more  CDC 2008»
15 years 4 months ago
Controlled random access MAC for network utility maximization in wireless networks
— There has been much recent interest in protocol design for wireless networks based on maximizing a network utility function. A significant advance in recent years is the obser...
Robert J. McCabe, Nikolaos M. Freris, P. R. Kumar
106
Voted
CISS
2008
IEEE
15 years 4 months ago
Distributed power control in wireless ad hoc networks using message passing: Throughput optimality and network utility maximizat
— This paper presents an algorithm for distributed power control and scheduling over wireless ad hoc-networks, where the data rate on each link depends on the transmission power ...
Aneesh Reddy, Sanjay Shakkottai, Lei Ying
COLCOM
2007
IEEE
15 years 4 months ago
Multicasting in groupware?
— While multicast has been studied extensively in many domains such as content streaming and file sharing, there is little research applying it to synchronous collaborations invo...
Sasa Junuzovic, Prasun Dewan