Sciweavers

418 search results - page 23 / 84
» Source Controlled Modulation Scheme for Sources with Memory
Sort
View
ICPPW
2006
IEEE
14 years 1 months ago
An Adaptive Directed Query Dissemination Scheme for Wireless Sensor Networks
This paper describes a directed query dissemination scheme, DirQ that routes queries to the appropriate source nodes based on both constant and dynamicvalued attributes such as se...
Supriyo Chatterjea, Simone De Luigi, Paul J. M. Ha...
ICMCS
2005
IEEE
135views Multimedia» more  ICMCS 2005»
14 years 1 months ago
Retrieving, Adapting and Delivering Multimedia Content Using a Mobile Agent Architecture
An integrated, reconfigurable, adaptable and open system for mining, indexing and retrieving multimedia information based on a mobile agent technology scheme is presented. The sys...
Nikolaos Papadakis, Anastasios D. Doulamis, Dimitr...
MOBIHOC
2009
ACM
14 years 8 months ago
A practical joint network-channel coding scheme for reliable communication in wireless networks
In this paper, we propose a practical scheme, called Non-Binary Joint Network-Channel Decoding (NB-JNCD) for reliable communication in wireless networks. It seamlessly couples cha...
Zheng Guo, Jie Huang, Bing Wang, Jun-Hong Cui, She...
DAC
2004
ACM
14 years 8 months ago
Memory access scheduling and binding considering energy minimization in multi-bank memory systems
Memory-related activity is one of the major sources of energy consumption in embedded systems. Many types of memories used in embedded systems allow multiple operating modes (e.g....
Chun-Gi Lyuh, Taewhan Kim
ISSRE
2010
IEEE
13 years 5 months ago
Preventing Overflow Attacks by Memory Randomization
Buffer overflow is known to be a common memory vulnerability affecting software. It is exploited to gain various kinds of privilege escalation. C and C++ are very commonly used to ...
Vivek Iyer, Amit Kanitkar, Partha Dasgupta, Raghun...