Sciweavers

4998 search results - page 992 / 1000
» The case for intentional networking
Sort
View
TELSYS
2002
128views more  TELSYS 2002»
13 years 8 months ago
An Evaluation of Shared Multicast Trees with Multiple Cores
Native multicast routing protocols have been built and deployed using two basic types of trees: singlesource, shortest-path trees and shared, core-based trees. Core-based multicas...
Daniel Zappala, Aaron Fabbri, Virginia Mary Lo
TKDE
2002
140views more  TKDE 2002»
13 years 8 months ago
Transaction Processing in Mobile, Heterogeneous Database Systems
As technological advances are made in software and hardware, the feasibility of accessing information "any time, anywhere" is becoming a reality. Furthermore, the diversi...
James B. Lim, Ali R. Hurson
ICMCS
2010
IEEE
181views Multimedia» more  ICMCS 2010»
13 years 7 months ago
LDPC FEC code extension for unequal error protection in 2nd generation DVB systems
One of the envisioned advantages of scalable video coding is its inherent suitability for achieving unequal error protection (UEP). UEP can be effectively used for graceful qualit...
Lukasz Kondrad, Imed Bouazizi, Moncef Gabbouj
ICRA
2010
IEEE
134views Robotics» more  ICRA 2010»
13 years 7 months ago
Generalized Bilateral MIMO Control by States Convergence with time delay and application for the teleoperation of a 2-DOF helico
— Bilateral Control by States Convergence is a novel and little exploited control strategy that has been successfully applied to the teleoperation of robotic manipulators using S...
Claudia Pérez-D'Arpino, Wilfredis Medina Me...
SCN
2010
Springer
143views Communications» more  SCN 2010»
13 years 7 months ago
History-Free Aggregate Message Authentication Codes
Aggregate message authentication codes, as introduced by Katz and Lindell (CT-RSA 2008), combine several MACs into a single value, which has roughly the same size as an ordinary MA...
Oliver Eikemeier, Marc Fischlin, Jens-Fabian G&oum...