Sciweavers

1266 search results - page 192 / 254
» Threat Evaluation Method for Distributed Network Environment
Sort
View
CN
2007
146views more  CN 2007»
15 years 3 months ago
Autonomic control and personalization of a wireless access network
As ICT services are becoming more ubiquitous and mobile and access technologies grow to be more heterogeneous and complex, we are witnessing the increasing importance of two relat...
Nicola Blefari-Melazzi, Dario Di Sorte, Mauro Femm...
TMC
2008
91views more  TMC 2008»
15 years 3 months ago
Efficient and Resilient Backbones for Multihop Wireless Networks
We consider the problem of finding "backbones" in multihop wireless networks. The backbone provides end-toend connectivity, allowing non-backbone nodes to save energy sin...
Seungjoon Lee, Bobby Bhattacharjee, Aravind Sriniv...
ICMCS
2008
IEEE
206views Multimedia» more  ICMCS 2008»
15 years 10 months ago
Redundant motion vectors for improved error resilience in H.264/AVC coded video
This proposal presents a new error robust strategy for encoding redundant pictures for the H.264/AVC standard. The method is based on providing motion vectors as redundant data, i...
Maheshi B. Dissanayake, Chaminda T. E. R. Hewage, ...
LCN
2006
IEEE
15 years 10 months ago
Computing Real Time Jobs in P2P Networks
— In this paper, we present a distributed computing framework designed to support higher quality of service and fault tolerance for processing deadline-driven tasks in a P2P envi...
Jingnan Yao, Jian Zhou, Laxmi N. Bhuyan
GLOBECOM
2009
IEEE
15 years 10 months ago
ANTS - A Framework for Knowledge Based NAT Traversal
—Today most home networks are connected to the Internet via Network Address Translation (NAT) devices. NAT is an obstacle for services that should be accessible from the public I...
Andreas Müller, Andreas Klenk, Georg Carle