Sciweavers

385 search results - page 72 / 77
» Comparing Usage Performance on Mobile Applications
Sort
View
ICCSA
2005
Springer
14 years 26 days ago
Policy Based Handoff in MIPv6 Networks
As the requirements on high-availability for multimedia intensified new applications increase the pressure for the higher bandwidth on wireless networks, just upgrading to the high...
Jong-Hyouk Lee, Byungchul Park, Hyunseung Choo, Ta...
MWCN
2004
Springer
14 years 22 days ago
Understanding the Interactions between Unicast and Group Communications Sessions in Ad Hoc Networks
Abstract In this paper, our objective is to study and understand the mutual effects between the group communication protocols and unicast sessions in mobile ad hoc networks. The mo...
Lap Kong Law, Srikanth V. Krishnamurthy, Michalis ...
ICCD
2007
IEEE
152views Hardware» more  ICCD 2007»
13 years 11 months ago
Compiler-assisted architectural support for program code integrity monitoring in application-specific instruction set processors
As application-specific instruction set processors (ASIPs) are being increasingly used in mobile embedded systems, the ubiquitous networking connections have exposed these systems...
Hai Lin, Xuan Guan, Yunsi Fei, Zhijie Jerry Shi
TASLP
2002
79views more  TASLP 2002»
13 years 7 months ago
Perception-based partial encryption of compressed speech
Mobile multimedia applications, the focus of many forthcoming wireless services, increasingly demand low-power techniques implementing content protection and customer privacy. In t...
Antonio Servetti, Juan Carlos De Martin
JPDC
2006
141views more  JPDC 2006»
13 years 7 months ago
M-TREE: A high efficiency security architecture for protecting integrity and privacy of software
Secure processor architectures enable new sets of applications such as commercial grid computing, software copy protection and secure mobile agents by providing secure computing e...
Chenghuai Lu, Tao Zhang, Weidong Shi, Hsien-Hsin S...