Sciweavers

410 search results - page 74 / 82
» Priority Encoding Transmission
Sort
View
CSREASAM
2006
13 years 9 months ago
A Study on DRM System for On/Off Line Key Authentication
- This paper proposes a Hash Chain algorithm to create a key safer than the existing encryption method, and suggests an encryption method of higher security than the existing syste...
Kun-Won Jang, Chan-Kil Park, Jung-Jae Kim, Moon-Se...
CGIM
2003
13 years 9 months ago
Lossy 3D Mesh Compression using Loop Scheme
Subdivision surfaces are finding their way into many Computer Aided Design and Animation packages. Popular choices include Loop, Catmull-Clark, Doo-Sabin etc. Subdivision surfaces...
P. Mongkolnam, Anshuman Razdan, Gerald E. Farin
CORR
2010
Springer
74views Education» more  CORR 2010»
13 years 7 months ago
RAFDA: Middleware Supporting the Separation of Application Logic from Distribution Policy
Middleware technologies, often limit the way in which object classes may be used in distributed applications due to the fixed distribution policies imposed by the Middleware system...
Alan Dearle, Scott M. Walker, Stuart J. Norcross, ...
CORR
2006
Springer
92views Education» more  CORR 2006»
13 years 7 months ago
Myopic Coding in Wireless Networks
Abstract -We investigate the achievable rate of data transmission from sources to sinks through a multiple-relay network. We study achievable rates for omniscient coding, in which ...
Lawrence Ong, Mehul Motani
CORR
2007
Springer
156views Education» more  CORR 2007»
13 years 7 months ago
Capacity Gain from Two-Transmitter and Two-Receiver Cooperation
Abstract—Capacity improvement from transmitter and receiver cooperation is investigated in a two-transmitter, two-receiver network with phase fading and full channel state inform...
Chris T. K. Ng, Nihar Jindal, Andrea J. Goldsmith,...