Sciweavers

377 search results - page 17 / 76
» Constrained Codes as Networks of Relations
Sort
View
ADHOCNOW
2005
Springer
14 years 1 months ago
Reed-Solomon and Hermitian Code-Based Scheduling Protocols for Wireless Ad Hoc Networks
Abstract. In this work we investigate bounds on throughput and delay performance of a scheduling protocol that derives its decisions from codes traditionally used to correct or det...
Carlos H. Rentel, Thomas Kunz
ICC
2009
IEEE
239views Communications» more  ICC 2009»
14 years 2 months ago
An Analytical Approach for Throughput Evaluation of Wireless Network Coding
In this paper, we propose a new analytical model for throughput evaluation of wireless network coding. This new approach is based on a probabilistic viewpoint on network coding, i....
Mohammad H. Amerimehr, Farid Ashtiani, Mohammad Ba...
CSFW
2000
IEEE
13 years 11 months ago
Confidentiality for Mobile Code: The Case of a Simple Payment Protocol
We propose an approach to support confidentiality for mobile implementations of security-sensitive protocols using Java/JVM. An applet which receives and passes on confidential in...
Mads Dam, Pablo Giambiagi
ICMCS
2007
IEEE
130views Multimedia» more  ICMCS 2007»
14 years 2 months ago
Wyner-Ziv Video Coding Based on Turbo Codes Exploiting Perfect Knowledge of Parity Bits
In a Wyner-Ziv video coding system based on turbo codes, parity bits are generated for a Wyner-Ziv frame and transmitted to the decoder. In this context of distributed source codi...
Hu Chen, Eckehard G. Steinbach
MM
2003
ACM
122views Multimedia» more  MM 2003»
14 years 28 days ago
Layered coding vs. multiple descriptions for video streaming over multiple paths
Abstract. In this paper, we examine the performance of specific implementations of multiple description coding and of layered coding for video streaming over error-prone packet sw...
Jacob Chakareski, Sangeun Han, Bernd Girod