Sciweavers

548 search results - page 86 / 110
» An authorization and access control scheme for pervasive com...
Sort
View
TCSV
2010
13 years 3 months ago
Cross-Layer Packet Retry Limit Adaptation for Video Transport Over Wireless LANs
Video transport over wireless networks requires retransmissions to successfully deliver video data to a receiver in case of packet loss, leading to increased delay time for the dat...
Chih-Ming Chen, Chia-Wen Lin, Yung-Chang Chen
CHI
2008
ACM
14 years 9 months ago
Undercover: authentication usable in front of prying eyes
A number of recent scams and security attacks (phishing, spyware, fake terminals, ...) hinge on a crook's ability to observe user behavior. In this paper, we describe the des...
Hirokazu Sasamoto, Nicolas Christin, Eiji Hayashi
DAC
2006
ACM
14 years 10 months ago
Leakage power reduction of embedded memories on FPGAs through location assignment
Transistor leakage is poised to become the dominant source of power dissipation in digital systems, and reconfigurable devices are not immune to this problem. Modern FPGAs already...
Yan Meng, Timothy Sherwood, Ryan Kastner
WOWMOM
2000
ACM
96views Multimedia» more  WOWMOM 2000»
14 years 1 months ago
An integrated mobility and traffic model for resource allocation in wireless networks
In a wireless communications network, the movement of mobile users presents significant technical challenges to providing efficient access to the wired broadband network. In this ...
Hisashi Kobayashi, Shun-Zheng Yu, Brian L. Mark
JSAC
2007
130views more  JSAC 2007»
13 years 9 months ago
Cross-layer QoS Analysis of Opportunistic OFDM-TDMA and OFDMA Networks
Abstract— Performance analysis of multiuser orthogonal frequency division multiplexing (OFDM-TDMA) and orthogonal frequency division multiple access (OFDMA) networks in support o...
Yu-Jung Chang, Feng-Tsun Chien, C. C. Jay Kuo