Sciweavers

233 search results - page 16 / 47
» Abstraction-Carrying Code: a Model for Mobile Code Safety
Sort
View
ICC
2009
IEEE
13 years 5 months ago
Opportunities, Constraints, and Benefits of Relaying in the Presence of Interference
In this paper the interference channel is extended by additional relay nodes in order to investigate the influence of interference on the design and performance of relaying protoco...
Peter Rost, Gerhard Fettweis, J. Nicholas Laneman
INFOCOM
2009
IEEE
14 years 2 months ago
Forward Correction and Fountain codes in Delay Tolerant Networks
Abstract—Delay tolerant Ad-hoc Networks leverage the mobility of relay nodes to compensate for lack of permanent connectivity and thus enable communication between nodes that are...
Eitan Altman, Francesco De Pellegrini
CEEMAS
2007
Springer
14 years 1 months ago
Agent-Based Network Protection Against Malicious Code
This paper presents an agent-based approach to Network Intrusion Prevention on corporate networks, emphasizing the protection from fast-spreading mobile malicious code outbreaks (e...
Martin Rehák, Michal Pechoucek, Jan Tozicka...
ICMCS
2005
IEEE
116views Multimedia» more  ICMCS 2005»
14 years 1 months ago
Lossless image compression with tree coding of magnitude levels
With the rapid development of digital technology in consumer electronics, the demand to preserve raw image data for further editing or repeated compression is increasing. Traditio...
Hua Cai, Jiang Li
PERVASIVE
2005
Springer
14 years 27 days ago
A Conceptual Framework for Camera Phone-Based Interaction Techniques
This paper proposes and evaluates interaction techniques for camera-equipped mobile phones. The proposed techniques are based on a visual code system that provides a number of orie...
Michael Rohs, Philipp Zweifel