Sciweavers

6122 search results - page 1080 / 1225
» Securing network access in wireless sensor networks
Sort
View
ICMCS
2006
IEEE
148views Multimedia» more  ICMCS 2006»
15 years 4 months ago
A Handover Approach to DVB-H Services
DVB-H offers a new platform for IP-based services and contributes to universal access. There are many challenges of providing multimedia TV experience for DVB-H users anywhere any...
Ville Ollikainen, Chengyuan Peng
JCIT
2008
245views more  JCIT 2008»
14 years 10 months ago
Quality of Service (QoS) of Voice over MAC Protocol 802.11 using NS-2
Transmitting voice through IP data network can provide significant cost savings. However if not managed properly, voice quality can degrade due to data network congestion. Voice o...
Dileep Kumar, Saleem Ahmed, Yeonseung Ryu
DIALM
2007
ACM
178views Algorithms» more  DIALM 2007»
15 years 2 months ago
Near-Optimal Compression of Probabilistic Counting Sketches for Networking Applications
Sketches--data structures for probabilistic, duplicate insensitive counting--are central building blocks of a number of recently proposed network protocols, for example in the con...
Björn Scheuermann, Martin Mauve
EWSN
2004
Springer
15 years 3 months ago
Networked Slepian-Wolf: Theory and Algorithms
Abstract. In this paper, we consider the minimization of a relevant energy consumption related cost function in the context of sensor networks where correlated sources are generate...
Razvan Cristescu, Baltasar Beferull-Lozano, Martin...
TC
2008
14 years 10 months ago
An Energy-Delay Tunable Task Allocation Strategy for Collaborative Applications in Networked Embedded Systems
Collaborative applications with energy and low-delay constraints are emerging in various networked embedded systems like wireless sensor networks and multimedia terminals. Conventi...
Tao Xie 0004, Xiao Qin
« Prev « First page 1080 / 1225 Last » Next »