Sciweavers

11547 search results - page 2297 / 2310
» Quantum computing and communication
Sort
View
141
Voted
COMCOM
2008
104views more  COMCOM 2008»
15 years 1 months ago
A network-assisted mobile VPN for securing users data in UMTS
This paper proposes a network-assisted mobile Virtual Private Network (mVPN) security scheme that provides secure remote access to corporate resources over the Universal Mobile Te...
Christos Xenakis, Christoforos Ntantogian, Ioannis...
CORR
2010
Springer
123views Education» more  CORR 2010»
15 years 1 months ago
A Peer-to-Peer Middleware Framework for Resilient Persistent Programming
The persistent programming systems of the 1980s offered a programming model that integrated computation and long-term storage. In these systems, reliable applications could be eng...
Alan Dearle, Graham N. C. Kirby, Stuart J. Norcros...
MMS
2008
15 years 1 months ago
Mobile cinema: canonical processes for video adaptation
Nowadays, users not only want to watch digital videos on a PC but also use mobile devices to play back multimedia content. Video adaptation algorithms enable the visualization of ...
Stephan Kopf, Wolfgang Effelsberg
TCOM
2008
146views more  TCOM 2008»
15 years 1 months ago
Noncoherent eigenbeamforming and interference suppression for outdoor OFDM systems
Abstract--We investigate a new approach to uplink communications in wideband outdoor cellular systems that can take advantage of multiple antennas at the base station in a scalable...
Noah Jacobsen, Gwen Barriac, Upamanyu Madhow
JFP
2010
107views more  JFP 2010»
15 years 9 days ago
Lightweight checkpointing for concurrent ML
Transient faults that arise in large-scale software systems can often be repaired by re-executing the code in which they occur. Ascribing a meaningful semantics for safe re-execut...
Lukasz Ziarek, Suresh Jagannathan
« Prev « First page 2297 / 2310 Last » Next »