Sciweavers

542 search results - page 107 / 109
» Optimal delay scheduling in networks with arbitrary constrai...
Sort
View
ISM
2008
IEEE
111views Multimedia» more  ISM 2008»
15 years 4 months ago
Secure and Low Cost Selective Encryption for JPEG2000
Selective encryption is a new trend in content protection. It aims at reducing the amount of data to encrypt while achieving a sufficient and inexpensive security. This approach ...
Ayoub Massoudi, Frédéric Lefè...
IPSN
2004
Springer
15 years 2 months ago
Estimation from lossy sensor data: jump linear modeling and Kalman filtering
Due to constraints in cost, power, and communication, losses often arise in large sensor networks. The sensor can be modeled as an output of a linear stochastic system with random...
Alyson K. Fletcher, Sundeep Rangan, Vivek K. Goyal
WWW
2009
ACM
15 years 10 months ago
RuralCafe: web search in the rural developing world
The majority of people in rural developing regions do not have access to the World Wide Web. Traditional network connectivity technologies have proven to be prohibitively expensiv...
Jay Chen, Lakshminarayanan Subramanian, Jinyang Li
MOBISYS
2009
ACM
15 years 10 months ago
EnTracked: energy-efficient robust position tracking for mobile devices
An important feature of a modern mobile device is that it can position itself. Not only for use on the device but also for remote applications that require tracking of the device....
Mikkel Baun Kjærgaard, Jakob Langdal, Torben...
ICDCS
1999
IEEE
15 years 1 months ago
Search Space Reduction in QoS Routing
To provide real-time service or engineer constrained-based paths, networks require the underlying routing algorithm to be able to find low-cost paths that satisfy given Quality-of...
Liang Guo, Ibrahim Matta