Sciweavers

1505 search results - page 288 / 301
» On wireless network scheduling with intersession network cod...
Sort
View
PERCOM
2007
ACM
15 years 11 months ago
Physically Unclonable Function-Based Security and Privacy in RFID Systems
Radio Frequency Identification (RFID) is an increasingly popular technology that uses radio signals for object identification. Tracking and authentication in RFID tags have raised...
Leonid Bolotnyy, Gabriel Robins
MOBISYS
2003
ACM
15 years 11 months ago
Tactics-Based Remote Execution for Mobile Computing
Remote execution can transform the puniest mobile device into a computing giant able to run resource-intensive applications such as natural language translation, speech recognitio...
Rajesh Krishna Balan, Mahadev Satyanarayanan, SoYo...
MSWIM
2004
ACM
15 years 5 months ago
Speeding up the evaluation of multimedia streaming applications in MANETs using HMMs
Mobile ad-hoc networks (MANETs) present quite large packet loss bursts due to mobility. In this work we propose two models based on hidden Markov models for estimating packet arri...
Carlos Miguel Tavares Calafate, Pietro Manzoni, Ma...
NSDI
2010
15 years 1 months ago
Maranello: Practical Partial Packet Recovery for 802.11
Partial packet recovery protocols attempt to repair corrupted packets instead of retransmitting them in their entirety. Recent approaches have used physical layer confidence estim...
Bo Han, Aaron Schulman, Francesco Gringoli, Neil S...
EJWCN
2011
87views more  EJWCN 2011»
14 years 6 months ago
Resource Allocation for Overlapping MBS Zones
— Multicast and broadcast service (MBS) is one of the important services for next generation wireless systems. In WiMAX, the radio resource unit (i.e., time, frequency, code, etc...
Ray-Guang Cheng, Kuo-Jui Huang