Sciweavers

4761 search results - page 770 / 953
» Performance of Protocols
Sort
View
ESORICS
2002
Springer
16 years 3 months ago
Formal Security Analysis with Interacting State Machines
We introduce the ISM approach, a framework for modeling and verifying reactive systems in a formal, even machine-checked, way. The framework has been developed for applications in ...
David von Oheimb, Volkmar Lotz
PERCOM
2007
ACM
16 years 3 months ago
BlueTorrent: Cooperative content sharing for Bluetooth users
People wish to enjoy their everyday lives in various ways, among which entertainment plays a major role. In order to improve lifestyle with more ready access to entertainment cont...
Sewook Jung, Uichin Lee, Alexander Chang, Dae-Ki C...
MOBISYS
2004
ACM
16 years 3 months ago
Impromptu: Managing Networked Audio Applications for Mobile Users
This paper discusses the software architecture of Impromptu, a mobile IP-based audio computing platform, with an associated set of network-based applications and services. Impromp...
Chris Schmandt, Kwan Hong Lee, Jang Kim, Mark S. A...
MOBIHOC
2006
ACM
16 years 3 months ago
MLS: : an efficient location service for mobile ad hoc networks
MLS is a distributed location service to track the position of mobile nodes and to route messages between any two nodes. The lookup of nodes is achieved by searching in a hierarch...
Roland Flury, Roger Wattenhofer
DCC
2007
IEEE
16 years 3 months ago
Improved Resolution Scalability for Bi-Level Image Data in JPEG2000
In this paper, we address issues concerning bilevel image compression using JPEG2000. While JPEG2000 is designed to compress both bilevel and continuous tone image data using a sin...
Rahul Raguram, Michael W. Marcellin, Ali Bilgin