Sciweavers

COMSWARE
2008
IEEE
14 years 6 months ago
Location management area (LMA)-based MBS handover in mobile WiMAX systems
Abstract—Mobile WiMAX aims to provide multimedia multicast/broadcast service (MBS) as well as elastic data service. However, supporting delay sensitive applications like video/au...
Ji Hoon Lee, Taekyoung Kwon, Yanghee Choi, Sangheo...
COMSWARE
2008
IEEE
14 years 6 months ago
Call admission control: QoS issue for VoIP
—One of the vital key elements for providing Quality of Service (QoS) for VoIP is the Call Admission Control (CAC) capabilities of the Session Management /Call Session Control Fu...
Mohammad Asadul Hoque, Farhana Afroz
COMSWARE
2008
IEEE
14 years 6 months ago
Implementation aspects of reliable transport protocols in wireless sensor networks
Abstract—Our previous study comparing analytically a comprehensive set of reliable data streaming protocols has shown that an hybrid protocol comprising stop-and-wait hop-by-hop ...
Tuan D. Le, Yifei Dong, Ren Liu, Sanjay Jha, Zvi R...
COMSWARE
2008
IEEE
14 years 6 months ago
A large scale publish-subscribe platform for information delivery to mobile phones
—We have created a large-scale information delivery platform optimized for mobile phones and used it for many months now to run a content delivery service through SMS. We share t...
Thejovardhana Kote, S. Ramamirtham Jeyashankher, L...
COMSWARE
2008
IEEE
14 years 6 months ago
Thresholds for LDPC codes over OFDM
Aravind Iyengar, Dileep Manisseri Dileep, Andrew T...
COMSWARE
2008
IEEE
14 years 6 months ago
Simulation blocks for TOSSIM-T2
Tamma V. Prabhakar, S. Venkatesh, M. S. Sujay, J. ...
COMSWARE
2008
IEEE
14 years 6 months ago
DWT-DCT-SVD based watermarking
Some works are reported in the frequency domain watermarking using Single Value Decomposition (SVD). The two most commonly used methods are based on DCT-SVD and DWTSVD. The commonl...
K. A. Navas, M. C. Ajay, M. Lekshmi, T. S. Archana...
COMSWARE
2008
IEEE
14 years 6 months ago
Deterministic schemes for key distribution in wireless sensor networks
— In this paper, we propose a new security metric for measuring resilience of a symmetric key distribution scheme in wireless sensor network. A polynomial-based and a novel compl...
Abhishek Gupta, Joy Kuri