Sciweavers

3735 search results - page 610 / 747
» Order compression schemes
Sort
View
102
Voted
VTC
2006
IEEE
159views Communications» more  VTC 2006»
15 years 6 months ago
Comparison between Vertical Handoff Decision Algorithms for Heterogeneous Wireless Networks
— The next generation wireless networks will support the vertical handoff mechanism in which users can maintain the connections when they switch from one network to another (e.g....
Enrique Stevens-Navarro, Vincent W. S. Wong
ADHOCNOW
2006
Springer
15 years 6 months ago
ROAR: A Multi-rate Opportunistic AODV Routing Protocol for Wireless Ad-Hoc Networks
In this paper, we outline a simple approach, called ROAR, that enables the Ad-Hoc On-Demand Distance Vector (AODV) routing protocol to strengthen its routes by recruiting neighbors...
Kwan Wu Chin, Darryn Lowe
ISLPED
2006
ACM
119views Hardware» more  ISLPED 2006»
15 years 6 months ago
Process variation aware cache leakage management
In a few technology generations, limitations of fabrication processes will make accurate design time power estimates a daunting challenge. Static leakage current which comprises a...
Ke Meng, Russ Joseph
107
Voted
ISLPED
2006
ACM
119views Hardware» more  ISLPED 2006»
15 years 6 months ago
Dynamic thermal management for MPEG-2 decoding
In this paper, we propose an effective dynamic thermal management (DTM) scheme for MPEG-2 decoding by allowing some degree of spatiotemporal quality degradation. Given a target MP...
Wonbok Lee, Kimish Patel, Massoud Pedram
138
Voted
MMSEC
2006
ACM
132views Multimedia» more  MMSEC 2006»
15 years 6 months ago
On achievable security levels for lattice data hiding in the known message attack scenario
This paper presents a theoretical security analysis of lattice data hiding. The security depends on the secrecy of a dither signal that randomizes the codebook. If the same secret...
Luis Pérez-Freire, Fernando Pérez-Go...