Sciweavers

3735 search results - page 610 / 747
» Order compression schemes
Sort
View
VTC
2006
IEEE
159views Communications» more  VTC 2006»
15 years 11 months ago
Comparison between Vertical Handoff Decision Algorithms for Heterogeneous Wireless Networks
— The next generation wireless networks will support the vertical handoff mechanism in which users can maintain the connections when they switch from one network to another (e.g....
Enrique Stevens-Navarro, Vincent W. S. Wong
ADHOCNOW
2006
Springer
15 years 11 months ago
ROAR: A Multi-rate Opportunistic AODV Routing Protocol for Wireless Ad-Hoc Networks
In this paper, we outline a simple approach, called ROAR, that enables the Ad-Hoc On-Demand Distance Vector (AODV) routing protocol to strengthen its routes by recruiting neighbors...
Kwan Wu Chin, Darryn Lowe
ISLPED
2006
ACM
119views Hardware» more  ISLPED 2006»
15 years 11 months ago
Process variation aware cache leakage management
In a few technology generations, limitations of fabrication processes will make accurate design time power estimates a daunting challenge. Static leakage current which comprises a...
Ke Meng, Russ Joseph
ISLPED
2006
ACM
119views Hardware» more  ISLPED 2006»
15 years 11 months ago
Dynamic thermal management for MPEG-2 decoding
In this paper, we propose an effective dynamic thermal management (DTM) scheme for MPEG-2 decoding by allowing some degree of spatiotemporal quality degradation. Given a target MP...
Wonbok Lee, Kimish Patel, Massoud Pedram
MMSEC
2006
ACM
132views Multimedia» more  MMSEC 2006»
15 years 11 months ago
On achievable security levels for lattice data hiding in the known message attack scenario
This paper presents a theoretical security analysis of lattice data hiding. The security depends on the secrecy of a dither signal that randomizes the codebook. If the same secret...
Luis Pérez-Freire, Fernando Pérez-Go...