Sciweavers

1986 search results - page 302 / 398
» constraints 2006
Sort
View
GLOBECOM
2006
IEEE
14 years 2 months ago
Linear Joint Source-Channel Coding for Gaussian Sources through Fading Channels
Abstract— We consider the linear coding of a discrete memoryless Gaussian source transmitted through a discrete memoryless fading channel with additive white Gaussian noise (AWGN)...
Jinjun Xiao, Zhi-Quan Luo, Nihar Jindal
GLOBECOM
2006
IEEE
14 years 2 months ago
Algorithms for Server Placement in Multiple-Description-Based Media Streaming
— Multiple description coding (MDC) has emerged as a powerful technique for reliable real-time communications over lossy packet networks. In its basic form, it involves encoding ...
Satyajeet Ahuja, Marwan Krunz
GLOBECOM
2006
IEEE
14 years 2 months ago
Price-Sensitive Application Adaptation in Deadline-Based Networks
— In deadline-based networks, the delay performance experienced by real-time data transfer largely depends on traffic deadlines and the load level along the data transfer path. ...
Xiao Huan Liu, Yanni Ellen Liu
GLOBECOM
2006
IEEE
14 years 2 months ago
On the Feasibility of Very Low Complexity Trust Modules Using PKPS Synergies
Abstract— For many evolving application scenarios like ubiquitous and autonomic computing systems, trustworthy computing solutions are essential. However the fact that the autono...
Mahalingam Ramkumar
GLOBECOM
2006
IEEE
14 years 2 months ago
A Game Theoretic Approach to Detect Network Intrusions: The Cooperative Intruders Scenario
Abstract— In this paper, we consider the problem of detecting intrusions initiated by cooperative malicious nodes in infrastructure-based networks. We achieve this objective by s...
Mona Mehrandish, Hadi Otrok, Mourad Debbabi, Chadi...