Sciweavers

1799 search results - page 277 / 360
» Design considerations for MRAM
Sort
View
INFORMATICALT
2008
105views more  INFORMATICALT 2008»
15 years 4 months ago
Public Key Authentication Schemes for Local Area Networks
The invention of public-key cryptography makes many new network applications, such as electronic commerce (CE), possible. However, the widely used Internet is open and unprotected....
Tzungher Chen, Gwoboa Horng, Chuan-Sheng Yang
COMCOM
2007
139views more  COMCOM 2007»
15 years 4 months ago
Performance evaluation of scheduling in IEEE 802.16 based wireless mesh networks
IEEE 802.16 employs TDMA (Time Division Multiple Access) as the access method and the policy for selecting scheduled links in a given time slot will definitely impact the system ...
Bo Han, Weijia Jia, Lidong Lin
COMGEO
2007
ACM
15 years 4 months ago
A package for exact kinetic data structures and sweepline algorithms
In this paper we present a package for implementing exact kinetic data structures built on objects which move along polynomial trajectories. We discuss how the package design was ...
Daniel Russel, Menelaos I. Karavelas, Leonidas J. ...
JCM
2008
126views more  JCM 2008»
15 years 4 months ago
Video Quality Estimation for Mobile H.264/AVC Video Streaming
The scope of this paper is the estimation of subjective video quality for low-resolution video sequences as they are typical for mobile video streaming. Although the video quality ...
Michal Ries, Olivia Nemethova, Markus Rupp
CORR
2007
Springer
131views Education» more  CORR 2007»
15 years 4 months ago
Cognitive Medium Access: Exploration, Exploitation and Competition
—This paper considers the design of efficient strategies that allow cognitive users to choose frequency bands to sense and access among multiple bands with unknown parameters. F...
Lifeng Lai, Hesham El Gamal, Hai Jiang, H. Vincent...