Sciweavers

411 search results - page 61 / 83
» Design of a Transmission Protocol for a CVE
Sort
View
CNSR
2008
IEEE
214views Communications» more  CNSR 2008»
14 years 3 months ago
HGKM: A Group-Based Key Management Scheme for Sensor Networks Using Deployment Knowledge
Key establishment plays a central role in authentication and encryption in wireless sensor networks, especially when they are mainly deployed in hostile environments. Because of t...
Ngo Trong Canh, Young-Koo Lee, Sungyoung Lee
ICC
2008
IEEE
112views Communications» more  ICC 2008»
14 years 3 months ago
Achieving Fair TCP Access in the IEEE 802.11 Infrastructure Basic Service Set
—We illustrate the transport layer unfairness problem in the IEEE 802.11 Wireless Local Area Networks (WLANs). We design a link layer access control block for the Access Point (A...
Feyza Keceli, Inanc Inan, Ender Ayanoglu
ICC
2007
IEEE
196views Communications» more  ICC 2007»
14 years 3 months ago
Opportunistic Network Coding for Wireless Networks
— We consider energy efficient network coding design in wireless networks with multiple unicast sessions. Our approach decomposes multiple unicast sessions into a superposition ...
Wei Chen, Khaled Ben Letaief, Zhigang Cao
ICMCS
2006
IEEE
157views Multimedia» more  ICMCS 2006»
14 years 2 months ago
Using Rate-Distortion Metrics for Real-Time Internet Video Streaming with TCP
In this paper we explore use of a new rate-distortion metric for optimizing real-time Internet video streaming with the transmission control protocol (TCP). The basic idea is to c...
Antonios Argyriou
ICMCS
2006
IEEE
133views Multimedia» more  ICMCS 2006»
14 years 2 months ago
End-to-End Stereoscopic Video Streaming System
Today, stereoscopic and multi-view video are among the popular research areas in the multimedia world. In this study, we have designed and built a platform consisting of stereo-vi...
Selen Pehlivan, Anil Aksay, Cagdas Bilen, Gozde Bo...