Sciweavers

1557 search results - page 248 / 312
» Security and Cooperation in Wireless Networks
Sort
View
ADHOCNOW
2006
Springer
14 years 2 months ago
Key Revocation for Identity-Based Schemes in Mobile Ad Hoc Networks
Recently, identity-based cryptographic (IBC) schemes have been considered to secure mobile ad hoc networks (MANETs) due to their efficient key management properties. However, propo...
Katrin Hoeper, Guang Gong
PERCOM
2008
ACM
14 years 8 months ago
Multiagent Place-Based Virtual Communities for Pervasive Computing
This paper proposes a multiagent based virtual community as a new means to support pervasive computing services. We give a conceptual definition of the concept of Place-Based Virt...
Tuan Nguyen, Seng Wai Loke, Torab Torabi, Hongen L...
QSHINE
2009
IEEE
14 years 3 months ago
Revisiting a QoE Assessment Architecture Six Years Later: Lessons Learned and Remaining Challenges
In 2003, we presented an architecture for a streaming video quality assessment system [1]. Six years later, many of the challenges outlined in that paper remain. This paper revisit...
Amy Csizmar Dalal
WCNC
2008
IEEE
14 years 3 months ago
Asymptotic Distortion Performance of Source-Channel Diversity Schemes over Relay Channels
— Diversity techniques are an effective answer to the challenges presented by fading channels. This paper focuses on studying the performance of systems with diversity of three f...
Karim G. Seddik, Andres Kwasinski, K. J. Ray Liu
ICC
2007
IEEE
148views Communications» more  ICC 2007»
14 years 3 months ago
Improved Revenue and Radio Resource Usage through Inter-Operator Joint Radio Resource Management
— This paper proposes a two-layer Joint Radio Resource Management (JRRM) framework to improve the efficiency in multi-radio and multi-operator cellular scenarios. On the one hand...
Lorenza Giupponi, Ramón Agustí, Jord...