Sciweavers

2354 search results - page 58 / 471
» DRM as a layered system
Sort
View
COMSWARE
2006
IEEE
13 years 11 months ago
Architecting protocol stack optimizations on mobile devices
Applications using traditional protocol stacks (e.g TCP/IP) from wired networks do not function efficiently in mobile wireless scenarios. This is primarily due to the layered archi...
Vijay T. Raisinghani, Sridhar Iyer
TASE
2008
IEEE
13 years 7 months ago
Vision-Based Online Process Control in Manufacturing Applications
Applications such as layered manufacturing, or in general, solid free-form fabrication, pose a major challenge on online process control. For these parts to be functional, it is i...
Yuan Cheng, Mohsen A. Jafari
PERCOM
2005
ACM
14 years 7 months ago
Link Layer Security for SAHN Protocols
Abstract-- Wireless networks are at risk of security attacks since transmissions can be intercepted by anyone within the transmission range. Therefore participating entities should...
Muhammad Mahmudul Islam, Ronald Pose, Carlo Kopp
ICIP
2008
IEEE
14 years 9 months ago
Receiver driven layered multicast with layer-aware forward error correction
A wide range of different capabilities and connection qualities typically characterizes receivers of mobile television services. Receiver driven layered multicast (RDLM) offers an...
Cornelius Hellge, Thomas Schierl, Thomas Wiegand
CORR
2010
Springer
154views Education» more  CORR 2010»
13 years 7 months ago
Cross Layer Aware Adaptive MAC based on Knowledge Based Reasoning for Cognitive Radio Computer Networks
: In this paper we are proposing a new concept in MAC layer protocol design for Cognitive radio by combining information held by physical layer and MAC layer with analytical engine...
Vibhar Pathak, Krishna Chandra Roy, Santosh Kumar ...