Sciweavers

2024 search results - page 61 / 405
» Providing Secure Environments for Untrusted Network Applicat...
Sort
View
EATIS
2007
ACM
15 years 8 months ago
Application layer multicast techniques in grid environments
Resource and service discovery, data transfer or replica management, are some examples of basic operations of a grid which can gain efficiency by using multicast transmission tech...
Rafael Moreno-Vozmediano
161
Voted
GLOBECOM
2008
IEEE
15 years 5 months ago
Cross-Layer Rate Allocation for Multimedia Applications in Pervasive Computing Environment
Abstract— An important issue for supporting multimedia applications in multiple heterogeneous networks, a typical pervasive computing environment, is how to optimize the rate all...
Liang Zhou, Benoit Geller, Anne Wei, Baoyu Zheng, ...
153
Voted
TCSV
2002
94views more  TCSV 2002»
15 years 4 months ago
Supporting image and video applications in a multihop radio environment using path diversity and multiple description coding
This paper examines the effectiveness of combining multiple description coding (MDC) and multiple path transport (MPT) for video and image transmission in a multihop mobile radio n...
Nitin Gogate, Doo-Man Chung, Shivendra S. Panwar, ...
ISICT
2003
15 years 6 months ago
Security protocols for 2G and 3G wireless communications
Wireless communications are being driven by the need for providing network access to mobile or nomadic computing devices. The need for wireless access to a network is evident in c...
T. Newe, Tom Coffey
COMCOM
2007
95views more  COMCOM 2007»
15 years 4 months ago
Key management for long-lived sensor networks in hostile environments
Large-scale wireless sensor networks (WSNs) are highly vulnerable to attacks because they consist of numerous resource-constrained devices and communicate via wireless links. Thes...
Michael Chorzempa, Jung Min Park, Mohamed Eltoweis...