Sciweavers

COMSWARE
2008
IEEE
15 years 11 months ago
Location management area (LMA)-based MBS handover in mobile WiMAX systems
Abstract—Mobile WiMAX aims to provide multimedia multicast/broadcast service (MBS) as well as elastic data service. However, supporting delay sensitive applications like video/au...
Ji Hoon Lee, Taekyoung Kwon, Yanghee Choi, Sangheo...
COMSWARE
2008
IEEE
15 years 11 months ago
Call admission control: QoS issue for VoIP
—One of the vital key elements for providing Quality of Service (QoS) for VoIP is the Call Admission Control (CAC) capabilities of the Session Management /Call Session Control Fu...
Mohammad Asadul Hoque, Farhana Afroz
COMSWARE
2008
IEEE
15 years 11 months ago
Implementation aspects of reliable transport protocols in wireless sensor networks
Abstract—Our previous study comparing analytically a comprehensive set of reliable data streaming protocols has shown that an hybrid protocol comprising stop-and-wait hop-by-hop ...
Tuan D. Le, Yifei Dong, Ren Liu, Sanjay Jha, Zvi R...
COMSWARE
2008
IEEE
15 years 11 months ago
A large scale publish-subscribe platform for information delivery to mobile phones
—We have created a large-scale information delivery platform optimized for mobile phones and used it for many months now to run a content delivery service through SMS. We share t...
Thejovardhana Kote, S. Ramamirtham Jeyashankher, L...
COMSWARE
2008
IEEE
15 years 11 months ago
Thresholds for LDPC codes over OFDM
Aravind Iyengar, Dileep Manisseri Dileep, Andrew T...
COMSWARE
2008
IEEE
15 years 11 months ago
Simulation blocks for TOSSIM-T2
Tamma V. Prabhakar, S. Venkatesh, M. S. Sujay, J. ...
COMSWARE
2008
IEEE
15 years 11 months ago
DWT-DCT-SVD based watermarking
Some works are reported in the frequency domain watermarking using Single Value Decomposition (SVD). The two most commonly used methods are based on DCT-SVD and DWTSVD. The commonl...
K. A. Navas, M. C. Ajay, M. Lekshmi, T. S. Archana...
COMSWARE
2008
IEEE
15 years 11 months ago
Deterministic schemes for key distribution in wireless sensor networks
— In this paper, we propose a new security metric for measuring resilience of a symmetric key distribution scheme in wireless sensor network. A polynomial-based and a novel compl...
Abhishek Gupta, Joy Kuri