Sciweavers

889 search results - page 133 / 178
» The Design and Implementation of a Wireless Video Surveillan...
Sort
View
102
Voted
DATE
2003
IEEE
117views Hardware» more  DATE 2003»
15 years 5 months ago
Exploring SW Performance Using SoC Transaction-Level Modeling
This paper presents VISTA, a new methodology and tool dedicated to analyse system level performance by executing full-scale SW application code on a transaction-level model of the...
Imed Moussa, Thierry Grellier, Giang Nguyen
94
Voted
MOBISYS
2007
ACM
16 years 2 days ago
Rendezvous-based access control for medical records in the pre-hospital environment
We present rendezvous-based access control for access control in the pre-hospital environment. Rendezvous-based access control is a simple cryptographic access control method that...
Feike W. Dillema, Simone Lupetti
95
Voted
WOWMOM
2009
ACM
157views Multimedia» more  WOWMOM 2009»
15 years 7 months ago
The CHIANTI architecture for robust mobile Internet access
The quality of Internet access for mobile users may suffer from highly variable communication characteristics (packet loss, delay, throughput) and from temporary disconnections. T...
Jörg Ott, Petri Ylikoski, Nils Seifert, Caleb...
115
Voted
TIT
2002
95views more  TIT 2002»
15 years 3 days ago
Opportunistic beamforming using dumb antennas
Multiuser diversity is a form of diversity inherent in a wireless network, provided by independent time-varying channels across the different users. The diversity benefit is exploi...
Pramod Viswanath, David N. C. Tse, Rajiv Laroia
USENIX
1994
15 years 1 months ago
Reducing File System Latency using a Predictive Approach
Despite impressive advances in file system throughput resulting from technologies such as high-bandwidth networks and disk arrays, file system latency has not improved and in many...
Jim Griffioen, Randy Appleton