Sciweavers

4761 search results - page 776 / 953
» Performance of Protocols
Sort
View
168
Voted
HASE
2008
IEEE
15 years 10 months ago
Low Cost Secure Computation for the General Client-Server Computation Model
Due to the large number of attacks on open networks, information theft becomes a more and more severe problem. Secure computation can offer highly assured confidentiality protecti...
Liangliang Xiao, I-Ling Yen, Farokh B. Bastani
128
Voted
ICC
2008
IEEE
168views Communications» more  ICC 2008»
15 years 10 months ago
Topology Control for Reliable Sensor-to-Sink Data Transport in Sensor Networks
— Wireless Sensor Networks (WSNs) are generally used for harsh environments involving military surveillance, emergency response, and habitat monitoring. Due to severe resource co...
Jiong Wang, Sirisha Medidi
146
Voted
ICC
2008
IEEE
145views Communications» more  ICC 2008»
15 years 10 months ago
A Collision-Free MAC Scheme for Multimedia Wireless Mesh Backbone
— In this paper, a novel collision-free MAC scheme supporting multimedia applications is proposed for wireless mesh backbone. The proposed scheme is distributed, simple, and scal...
Ping Wang, Weihua Zhuang
163
Voted
ICMCS
2008
IEEE
206views Multimedia» more  ICMCS 2008»
15 years 10 months ago
Redundant motion vectors for improved error resilience in H.264/AVC coded video
This proposal presents a new error robust strategy for encoding redundant pictures for the H.264/AVC standard. The method is based on providing motion vectors as redundant data, i...
Maheshi B. Dissanayake, Chaminda T. E. R. Hewage, ...
112
Voted
INFOCOM
2008
IEEE
15 years 10 months ago
Searching for Rare Objects Using Index Replication
—Searching for objects is a fundamental problem for popular peer-to-peer file-sharing networks that contribute to much of the traffic on today’s Internet. While existing prot...
Krishna Puttaswamy, Alessandra Sala, Ben Y. Zhao