Sciweavers

5410 search results - page 124 / 1082
» When to Cross Over
Sort
View
117
Voted
ECIS
2000
15 years 2 months ago
Secure Access to Medical Data over the Internet
The concept of context-dependent access control has emerged during the last years: Information about the state of a process model of a working environment is combined with general ...
Ulrich Ultes-Nitsche, Stephanie Teufel
117
Voted
ICASSP
2010
IEEE
15 years 27 days ago
Energy efficient lossy transmission over sensor networks with feedback
The energy-distortion function (E(D)) for a network is defined as the minimum total energy required to achieve a target distortion D at the receiver without putting any restricti...
Aman Jain, Deniz Gündüz, Sanjeev R. Kulk...
115
Voted
CGF
2010
149views more  CGF 2010»
15 years 24 days ago
Over Two Decades of Integration-Based, Geometric Flow Visualization
With ever increasing computing power, it is possible to process ever more complex fluid simulations. However, a gap between data set sizes and our ability to visualize them remain...
Tony McLoughlin, Robert S. Laramee, Ronald Peikert...
CORR
2007
Springer
113views Education» more  CORR 2007»
15 years 20 days ago
Network Coding over a Noisy Relay : a Belief Propagation Approach
Abstract— In recent years, network coding has been investigated as a method to obtain improvements in wireless networks. A typical assumption of previous work is that relay nodes...
Sichao Yang, Ralf Koetter
97
Voted
JNW
2008
129views more  JNW 2008»
15 years 20 days ago
Network-Initiated Terminal Mobility in Voice over 3GPP-WLAN
This paper proposes a network-initiated terminal mobility mechanism (NITM) to facilitate handover with the session initiation protocol (SIP) in 3GPP Voice over WLAN (3GPP VoWLAN). ...
Wei-Kuo Chiang, Hsin-Fu Huang