Sciweavers

461 search results - page 57 / 93
» Protecting Transportation Infrastructure
Sort
View
IJNSEC
2007
161views more  IJNSEC 2007»
13 years 10 months ago
Data Hiding: Current Status and Key Issues
Image steganography is a covert communication method that uses an image as the cover to hide the truth from potential attackers that some secret message hidden in the image is bei...
Nan-I Wu, Min-Shiang Hwang
JDM
2000
128views more  JDM 2000»
13 years 9 months ago
Distributed Database Design for Mobile Geographical Applications
Advanced Traveler Information Systems (ATIS) require e cient information retrieval and updating in a dynamic environment at di erent geographical scales. ATIS applications are use...
Manhoi Choy, Mei-Po Kwan, Hong Va Leong
TON
1998
68views more  TON 1998»
13 years 9 months ago
Optimal capacity placement for path restoration in STM or ATM mesh-survivable networks
Abstract—The total transmission capacity required by a transport network to satisfy demand and protect it from failures contributes significantly to its cost, especially in long...
Rainer R. Iraschko, Mike H. MacGregor, Wayne D. Gr...
VTC
2010
IEEE
171views Communications» more  VTC 2010»
13 years 8 months ago
Optimum Physical-Layer Frame Size for Maximising the Application-Layer Rateless Code's Effective Throughput
— The tolerable packet-loss ratio of an Internet Protocol (IP) based wireless networks varies according to the specific services considered. File transfer for example must be er...
Tim Stevens, Robert G. Maunder, Lajos Hanzo
VTC
2010
IEEE
173views Communications» more  VTC 2010»
13 years 8 months ago
Streetcast: An Urban Broadcast Protocol for Vehicular Ad-Hoc Networks
—Vehicular Ad-hoc NETworks (VANETs) adopting Dedicated Short-Range Communications (DSRCs) have emerged as a preferred choice of network design for the Intelligent Transportation ...
Chih-Wei Yi, Yi-Ta Chuang, Hou-Heng Yeh, Yu-Chee T...