Sciweavers

6122 search results - page 1135 / 1225
» Securing network access in wireless sensor networks
Sort
View
VTC
2010
IEEE
153views Communications» more  VTC 2010»
14 years 8 months ago
H.264 Wireless Video Telephony Using Iteratively-Detected Binary Self-Concatenated Coding
— In this contribution we propose a robust H.264 coded wireless video transmission scheme using iteratively decoded self-concatenated convolutional coding (SECCC). The proposed S...
Nasruminallah, Muhammad Fasih Uddin Butt, Soon Xin...
WOWMOM
2005
ACM
126views Multimedia» more  WOWMOM 2005»
15 years 3 months ago
Personalized Service Composition for Ubiquitous Multimedia Delivery
Digital multimedia has gained popularity due to the huge success of the Internet. Users acquire and disseminate multimedia information using different types of devices and communi...
Swaroop Kalasapur, Mohan Kumar, Behrooz Shirazi
SIGITE
2004
ACM
15 years 3 months ago
Experiences using tablet PCs in a programming laboratory
This experience report describes lessons learned using first generation tablet PCs to support active learning in an undergraduate computer science laboratory course. We learned th...
Stephen H. Edwards, N. Dwight Barnette
GLOBECOM
2007
IEEE
15 years 4 months ago
Directional MAC for 60 GHz Using Polarization Diversity Extension (DMAC-PDX)
— This paper proposes a directional medium access control (DMAC) algorithm for wireless communication networks operating in the 60 GHz bands. Wireless communications using the 60...
Ferhat Yildirim, Huaping Liu
ACSAC
2006
IEEE
15 years 4 months ago
V-COPS: A Vulnerability-Based Cooperative Alert Distribution System
The efficiency of promptly releasing security alerts of established analysis centers has been greatly challenged by the continuous emergence of various large scale network attack...
Shiping Chen, Dongyu Liu, Songqing Chen, Sushil Ja...
« Prev « First page 1135 / 1225 Last » Next »