Due to the large number of attacks on open networks, information theft becomes a more and more severe problem. Secure computation can offer highly assured confidentiality protecti...
— Wireless Sensor Networks (WSNs) are generally used for harsh environments involving military surveillance, emergency response, and habitat monitoring. Due to severe resource co...
— In this paper, a novel collision-free MAC scheme supporting multimedia applications is proposed for wireless mesh backbone. The proposed scheme is distributed, simple, and scal...
This proposal presents a new error robust strategy for encoding redundant pictures for the H.264/AVC standard. The method is based on providing motion vectors as redundant data, i...
Maheshi B. Dissanayake, Chaminda T. E. R. Hewage, ...
—Searching for objects is a fundamental problem for popular peer-to-peer file-sharing networks that contribute to much of the traffic on today’s Internet. While existing prot...