Sciweavers

63 search results - page 7 / 13
» sips 2008
Sort
View
PIMRC
2008
IEEE
14 years 20 days ago
Increasing SIP firewall performance by ruleset size limitation
Abstract— To protect SIP communication networks from attacks, especially flooding attacks like Denial-of-Service or message spam, Intrusion Detection Systems (IDS) are deployed ...
Sven Ehlert, Ge Zhang, Thomas Magedanz
PIMRC
2008
IEEE
14 years 20 days ago
Constrained opportunistic power control in wireless networks
— In the opportunistic power control algorithm (OPC), designed in [1], [2], each user tries to keep the product of its transmit power and its experienced effective interference t...
Mehdi Rasti, Ahmad R. Sharafat
COMCOM
2004
177views more  COMCOM 2004»
13 years 6 months ago
Analysis of SIP-based mobility management in 4G wireless networks
Providing seamless mobility support is one of the most challenging problems towards the system integration of fourth generation (4G) wireless networks. Because of the transparency...
Nilanjan Banerjee, Wei Wu, Kalyan Basu, Sajal K. D...
SIPS
2008
IEEE
14 years 20 days ago
Scheduling of dataflow models within the Reconfigurable Video Coding framework
The upcoming Reconfigurable Video Coding (RVC) standard from MPEG (ISO/IEC SC29WG11) defines a library of coding tools to specify existing or new compressed video formats and deco...
Jani Boutellier, Veeranjaneyulu Sadhanala, Christo...
SIPS
2008
IEEE
14 years 20 days ago
Analysis of belief propagation for hardware realization
Belief propagation has become a popular technique for solving computer vision problems, such as stereo estimation and image denoising. However, it requires large memory and bandwi...
Chao-Chung Cheng, Chia-Kai Liang, Yen-Chieh Lai, H...