Sciweavers

6781 search results - page 1267 / 1357
» Processors for Mobile Applications
Sort
View
ITIIS
2010
144views more  ITIIS 2010»
13 years 6 months ago
Cross-layer Design of Rate and Quality Adaptation Schemes for Wireless Video Streaming
Video streaming service over wireless networks is a challenging task because of the changes in the wireless channel conditions that can occur due to interference, fading, and stat...
Sunhun Lee, Kwangsue Chung
PVLDB
2010
108views more  PVLDB 2010»
13 years 6 months ago
Retrieving Top-k Prestige-Based Relevant Spatial Web Objects
The location-aware keyword query returns ranked objects that are near a query location and that have textual descriptions that match query keywords. This query occurs inherently i...
Xin Cao, Gao Cong, Christian S. Jensen
SIVP
2010
184views more  SIVP 2010»
13 years 6 months ago
Multichannel AR parameter estimation from noisy observations as an errors-in-variables issue
In various applications from radar processing to mobile communication systems based on CDMA for instance, M-AR multichannel processes are often considered and may be combined with...
Julien Petitjean, Eric Grivel, William Bobillet, P...
TPDS
2010
112views more  TPDS 2010»
13 years 6 months ago
Resource Scheduling in Wireless Networks Using Directional Antennas
—Due to a continued increase in the speed and capacities of computing devices, combined with our society’s growing need for mobile communication capabilities, multihop wireless...
Imad Jawhar, Jie Wu, Dharma P. Agrawal
TRUST
2010
Springer
13 years 6 months ago
Key Attestation from Trusted Execution Environments
Abstract. Credential platforms implemented on top of Trusted Execution Environments3 (TrEEs) allow users to store and use their credentials, e.g., cryptographic keys or user passwo...
Kari Kostiainen, Alexandra Dmitrienko, Jan-Erik Ek...
« Prev « First page 1267 / 1357 Last » Next »