Sciweavers

4004 search results - page 82 / 801
» How Many Packets Can We Encode
Sort
View
119
Voted
CCR
2004
62views more  CCR 2004»
15 years 2 months ago
Methodological frameworks for large-scale network analysis and design
This paper emphasizes the need for methodological frameworks for analysis and design of large scale networks which are independent of specific design innovations and their advocac...
Antonis Papachristodoulou, Lun Li, John C. Doyle
99
Voted
CORR
2008
Springer
77views Education» more  CORR 2008»
15 years 2 months ago
Energy-efficient Scheduling of Delay Constrained Traffic over Fading Channels
Abstract--A delay-constrained scheduling problem for pointto-point communication is considered: a packet of B bits must be transmitted by a hard deadline of T slots over a timevary...
Juyul Lee, Nihar Jindal
117
Voted
IFIP
2009
Springer
15 years 9 months ago
Enhancing Progressive Encryption for Scalable Video Streams
The technique called progressive encryption is used in many areas of content security. However, the plain algorithm itself is only applicable in real transmission scenarios where n...
Viktor Gergely, Gábor Fehér
106
Voted
ICPR
2006
IEEE
16 years 3 months ago
Machine Learning for Video Compression: Macroblock Mode Decision
Video Compression currently is dominated by engineering and fine-tuned heuristic methods. In this paper, we propose to instead apply the well-developed machinery of machine learni...
Christoph H. Lampert
152
Voted
MASCOTS
2004
15 years 4 months ago
An Optimisation Model for a Two-Node Router Network
Architectural designs for routers and networks of routers to support mobile communication are analysed for their end-to-end performance using a simple Markov model. In view of the...
Nalan Gülpinar, Peter G. Harrison, Berç...