Sciweavers

1444 search results - page 194 / 289
» The end of users
Sort
View
106
Voted
ICC
2009
IEEE
142views Communications» more  ICC 2009»
15 years 7 months ago
SDMA for 60GHz Gigabit Wireless Networks
—With the opening of the 60 GHz spectrum for WLANs, there has been a great deal of interest in academia and industry on how best to exploit the more than 5 GHz of available bandw...
Candy Yiu, Suresh Singh
105
Voted
IEEESCC
2009
IEEE
15 years 7 months ago
A Service Oriented Architecture for Personalized Rich Media Delivery
Multimedia streaming means delivering continuous data to a plethora of client devices. Besides the actual data transport this also needs a high degree of content adaptation respec...
Sascha Tönnies, Benjamin Köhncke, Patric...
88
Voted
INFOCOM
2009
IEEE
15 years 7 months ago
Event Recognition in Sensor Networks by Means of Grammatical Inference
Abstract—Modern military and civilian surveillance applications should provide end users with the high level representation of events observed by sensors rather than with the raw...
Sahin Cem Geyik, Boleslaw K. Szymanski
104
Voted
INFOCOM
2009
IEEE
15 years 7 months ago
Experimental Comparison of Bandwidth Estimation Tools for Wireless Mesh Networks
—Measurement of available bandwidth in a network has always been a topic of great interest. This knowledge can be applied to a wide variety of applications and can be instrumenta...
Dhruv Gupta, Di Wu, Prasant Mohapatra, Chen-Nee Ch...
99
Voted
IWSEC
2009
Springer
15 years 7 months ago
Tamper-Tolerant Software: Modeling and Implementation
Abstract. Common software-protection systems attempt to detect malicious observation and modification of protected applications. Upon tamper detection, anti-hacking code may produ...
Mariusz H. Jakubowski, Chit Wei Saw, Ramarathnam V...