Sciweavers

1266 search results - page 240 / 254
» Threat Evaluation Method for Distributed Network Environment
Sort
View
94
Voted
MM
2004
ACM
155views Multimedia» more  MM 2004»
15 years 3 months ago
Disruption-tolerant content-aware video streaming
Communication between a pair of nodes in the network may get disrupted due to failures of links/nodes resulting in zero effective bandwidth between them during the recovery perio...
Tiecheng Liu, Srihari Nelakuditi
GRID
2000
Springer
15 years 1 months ago
An Advanced User Interface Approach for Complex Parameter Study Process Specification on the Information Power Grid
The creation of parameter study suites has recently become a more challenging problem as the parameter studies have become multi-tiered and the computational environment has becom...
Maurice Yarrow, Karen M. McCann, Rupak Biswas, Rob...
IMC
2009
ACM
15 years 4 months ago
Impact of transient CSMA/CA access delays on active bandwidth measurements
WLAN devices based on CSMA/CA access schemes have become a fundamental component of network deployments. In such wireless scenarios, traditional networking applications, tools, an...
Marc Portoles-Comeras, Albert Cabellos-Aparicio, J...
MOBISYS
2010
ACM
15 years 21 hour ago
On the limits of effective hybrid micro-energy harvesting on mobile CRFID sensors
Mobile sensing is difficult without power. Emerging Computational RFIDs (CRFIDs) provide both sensing and generalpurpose computation without batteries--instead relying on small ca...
Jeremy Gummeson, Shane S. Clark, Kevin Fu, Deepak ...
80
Voted
JSAC
2010
99views more  JSAC 2010»
14 years 8 months ago
Robust wireless video streaming using hybrid spatial/temporal retransmission
—Bandwidth demands and timing constraints are two major challenges for wireless video streaming applications. In this paper, we present a hybrid spatial/temporal retransmission p...
Mei-Hsuan Lu, Peter Steenkiste, Tsuhan Chen