-
1
-
-
29144522248
-
Autonomic system for mobility support in 4G networks
-
P. Vidales, J. Baliosion, J. Serrat, G. Mapp, F. Stejano, and A. Hopper Autonomic system for mobility support in 4G networks IEEE Journal on Selected Areas in Communications 23 2005 2288 2304
-
(2005)
IEEE Journal on Selected Areas in Communications
, vol.23
, pp. 2288-2304
-
-
Vidales, P.1
Baliosion, J.2
Serrat, J.3
Mapp, G.4
Stejano, F.5
Hopper, A.6
-
2
-
-
33947135327
-
The IMS platform: A solution for next generation network operators to be more than bit pipes
-
A. Cuevas, J.I. Moreno, P. Vidales, and H. Einsiedler The IMS platform: a solution for next generation network operators to be more than bit pipes IEEE Communications Magazine 44 2006 75 81
-
(2006)
IEEE Communications Magazine
, vol.44
, pp. 75-81
-
-
Cuevas, A.1
Moreno, J.I.2
Vidales, P.3
Einsiedler, H.4
-
3
-
-
34247606829
-
Efficient hybrid security mechanisms for heterogeneous sensor networks Traynor
-
K. Patrick, C. Raju, H. Cao, G. Zhu, and S. Porta Efficient hybrid security mechanisms for heterogeneous sensor networks Traynor IEEE Transactions on Mobile Computing 6 6 2007 663 677
-
(2007)
IEEE Transactions on Mobile Computing
, vol.6
, Issue.6
, pp. 663-677
-
-
Patrick, K.1
Raju, C.2
Cao, H.3
Zhu, G.4
Porta, S.5
-
4
-
-
78751643330
-
Multimedia encryption and watermarking in wireless environment
-
Idea Group Reference, An imprint of Idea Group Inc.
-
S. Lian, Multimedia encryption and watermarking in wireless environment, in: Book Handbook of Research on Wireless Security, Idea Group Reference, An imprint of Idea Group Inc., 2008.
-
(2008)
Book Handbook of Research on Wireless Security
-
-
Lian, S.1
-
6
-
-
33750592891
-
Handoffs in fourth generation heterogeneous networks Nasser
-
N. Nasser, A. Hasswa, and H. Hassanein Handoffs in fourth generation heterogeneous networks Nasser IEEE Communications Magazine 44 10 2006 96 103
-
(2006)
IEEE Communications Magazine
, vol.44
, Issue.10
, pp. 96-103
-
-
Nasser, N.1
Hasswa, A.2
Hassanein, H.3
-
7
-
-
67349248080
-
Quality of protection analysis and performance modeling in IP multimedia subsystem
-
A. Luo, C. Lin, K. Wang, L. Lei, and C. Liu Quality of protection analysis and performance modeling in IP multimedia subsystem Computer Communications 32 11 2009 1336 1345
-
(2009)
Computer Communications
, vol.32
, Issue.11
, pp. 1336-1345
-
-
Luo, A.1
Lin, C.2
Wang, K.3
Lei, L.4
Liu, C.5
-
8
-
-
34948897571
-
Performance analysis of priority scheduling mechanisms under heterogeneous network traffic
-
DOI 10.1016/j.jcss.2007.02.008, PII S002200000700013X, Network-Based Computing
-
X. Jin, and G. Min Performance analysis of priority scheduling mechanisms under heterogeneous network traffic Journal of Computer and System Sciences 73 8 2007 1207 1220 (Pubitemid 47531813)
-
(2007)
Journal of Computer and System Sciences
, vol.73
, Issue.8
, pp. 1207-1220
-
-
Jin, X.1
Min, G.2
-
9
-
-
42549122454
-
Security-aware resource allocation for real-time parallel jobs on homogeneous and heterogeneous clusters
-
T. Xie, and X. Qin Security-aware resource allocation for real-time parallel jobs on homogeneous and heterogeneous clusters IEEE Transactions on Parallel and Distributed Systems 19 5 2008 682 697
-
(2008)
IEEE Transactions on Parallel and Distributed Systems
, vol.19
, Issue.5
, pp. 682-697
-
-
Xie, T.1
Qin, X.2
-
10
-
-
67349250802
-
Joint QoS control for video streaming over wireless multihop networks: A cross-layer approach
-
L. Zhou, B. Zheng, A. Wei, B. Geller, and J. Cui Joint QoS control for video streaming over wireless multihop networks: a cross-layer approach International Journal of Electronics and Communications 63 8 2009 638 647
-
(2009)
International Journal of Electronics and Communications
, vol.63
, Issue.8
, pp. 638-647
-
-
Zhou, L.1
Zheng, B.2
Wei, A.3
Geller, B.4
Cui, J.5
-
11
-
-
44649188536
-
A robust resolution-enhancement scheme for video transmission over mobile ad-hoc networks
-
L. Zhou, B. Zheng, A. Wei, B. Geller, and J. Cui A robust resolution-enhancement scheme for video transmission over mobile ad-hoc networks IEEE Transactions on Broadcasting 54 2 2008 312 321
-
(2008)
IEEE Transactions on Broadcasting
, vol.54
, Issue.2
, pp. 312-321
-
-
Zhou, L.1
Zheng, B.2
Wei, A.3
Geller, B.4
Cui, J.5
-
12
-
-
70349577638
-
A scalable information security technique: Joint authentication-coding mechanism for multimedia over heterogeneous wireless networks
-
L. Zhou, B. Zheng, A. Wei, B. Geller, and J. Cui A scalable information security technique: joint authentication-coding mechanism for multimedia over heterogeneous wireless networks Wireless Personal Communications 51 1 2009 5 16
-
(2009)
Wireless Personal Communications
, vol.51
, Issue.1
, pp. 5-16
-
-
Zhou, L.1
Zheng, B.2
Wei, A.3
Geller, B.4
Cui, J.5
-
13
-
-
78751645631
-
-
.
-
-
-
-
14
-
-
78751644733
-
-
.
-
-
-
-
15
-
-
78751642682
-
-
.
-
-
-
-
16
-
-
78751648978
-
-
.
-
-
-
-
17
-
-
67349153313
-
Comparative analysis of quality of service and memory usage for adaptive failure detectors in healthcare systems
-
N. Xiong, A.V. Vasilakos, L.T. Yang, L. Song, P. Yi, R. Kannan, and Y. Li Comparative analysis of quality of service and memory usage for adaptive failure detectors in healthcare systems IEEE Journal on Selected Areas in Communications 27 4 2009 495 509
-
(2009)
IEEE Journal on Selected Areas in Communications
, vol.27
, Issue.4
, pp. 495-509
-
-
Xiong, N.1
Vasilakos, A.V.2
Yang, L.T.3
Song, L.4
Yi, P.5
Kannan, R.6
Li, Y.7
-
18
-
-
34247570082
-
Rate-distortion-authentication optimized streaming of authenticated video
-
DOI 10.1109/TCSVT.2006.888822
-
Z. Zhang, Q. Sun, and W.-C. Wong Rate-distortion-authentication optimized streaming of authenticated video IEEE Transactions on Circuits and Systems for Video Technology 17 5 2007 544 557 (Pubitemid 46685664)
-
(2007)
IEEE Transactions on Circuits and Systems for Video Technology
, vol.17
, Issue.5
, pp. 544-557
-
-
Zhang, Z.1
Sun, Q.2
Wong, W.-C.3
Apostolopoulos, J.4
Wee, S.5
-
19
-
-
34249320884
-
Joint source-channel-authentication resource allocation and unequal authenticity protection for multimedia over wireless networks
-
Z. Li, Q. Sun, and Y. Lian Joint source-channel-authentication resource allocation and unequal authenticity protection for multimedia over wireless networks IEEE Transactions on Multimedia 9 4 2007 837 850
-
(2007)
IEEE Transactions on Multimedia
, vol.9
, Issue.4
, pp. 837-850
-
-
Li, Z.1
Sun, Q.2
Lian, Y.3
-
20
-
-
31344458019
-
Scalable authentication of MPEG-4 streams
-
Y. Wu, and R.H. Deng Scalable authentication of MPEG-4 streams IEEE Transactions on Multimedia 8 1 2006 152 161
-
(2006)
IEEE Transactions on Multimedia
, vol.8
, Issue.1
, pp. 152-161
-
-
Wu, Y.1
Deng, R.H.2
-
21
-
-
34250021566
-
Authentication without identification
-
L. Anna Authentication without identification IEEE Security & Privacy Magazine 5 3 2007 69 71
-
(2007)
IEEE Security & Privacy Magazine
, vol.5
, Issue.3
, pp. 69-71
-
-
Anna, L.1
-
22
-
-
67249089572
-
Cross-layer rate allocation for multimedia applications in pervasive computing environment
-
L. Zhou, B. Geller, A. Wei, B. Zheng, Cross-layer rate allocation for multimedia applications in pervasive computing environment, in: Proceedings of IEEE GLOBECOM 08, New Orleans, USA, December 2008, pp. 1-5.
-
(2008)
Proceedings of IEEE GLOBECOM 08, New Orleans, USA, December
, pp. 1-5
-
-
Zhou, L.1
Geller, B.2
Wei, A.3
Zheng, B.4
|