Sciweavers

254 search results - page 36 / 51
» Semi-autonomous networks: Network resilience and adaptive tr...
Sort
View
ICC
2007
IEEE
110views Communications» more  ICC 2007»
14 years 2 months ago
Resource Optimization to Provision a Virtual Private Network Using the Hose Model
— Virtual Private Networks (VPN) provide a secure and reliable communication between customer sites over a shared network. With increase in number and size of VPNs, providers nee...
Monia Ghobadi, Sudhakar Ganti, Gholamali C. Shoja
ICIP
2003
IEEE
14 years 28 days ago
Fast motion estimation with modified diamond search for variable motion block sizes
The adaptive and powerful coding schemes in H.264 provide significant coding efficiency and some additional merits like error resilience and network friendliness. In spite of thes...
Woong Il Choi, Byeungwoo Jeon, Jechang Jeong
TCAD
2008
92views more  TCAD 2008»
13 years 7 months ago
IP Watermarking Using Incremental Technology Mapping at Logic Synthesis Level
Abstract--This paper proposes an adaptive watermarking technique by modulating some closed cones in an originally optimized logic network (master design) for technology mapping. Th...
Aijiao Cui, Chip-Hong Chang, Sofiène Tahar
JFP
2006
113views more  JFP 2006»
13 years 7 months ago
Efficient manipulation of binary data using pattern matching
Pattern matching is an important operation in functional programs. So far, pattern matching has been investigated in the context of structured terms. This article presents an appr...
Per Gustafsson, Konstantinos F. Sagonas
DSOM
2005
Springer
14 years 1 months ago
Decentralized Computation of Threshold Crossing Alerts
Threshold crossing alerts (TCAs) indicate to a management system that a management variable, associated with the state, performance or health of the network, has crossed a certain ...
Fetahi Wuhib, Mads Dam, Rolf Stadler, Alexander Cl...