Works matching IS 19767277 AND DT 2010 AND VI 4 AND IP 3
Results: 13
An Adaptive FEC Mechanism Using Cross-layer Approach to Enhance Quality of Video Transmission over 802.11 WLANs.
- Published in:
- KSII Transactions on Internet & Information Systems, 2010, v. 4, n. 3, p. 341, doi. 10.3837/tiis.2010.06.009
- By:
- Publication type:
- Article
PPD: A Robust Low-computation Local Descriptor for Mobile Image Retrieval.
- Published in:
- KSII Transactions on Internet & Information Systems, 2010, v. 4, n. 3, p. 305, doi. 10.3837/tiis.2010.06.007
- By:
- Publication type:
- Article
A Cooperative Spectrum Sensing Scheme Using Fuzzy Logic for Cognitive Radio Networks.
- Published in:
- KSII Transactions on Internet & Information Systems, 2010, v. 4, n. 3, p. 289, doi. 10.3837/tiis.2010.06.006
- By:
- Publication type:
- Article
Cooperative Multi-relay Scheme for Secondary Spectrum Access.
- Published in:
- KSII Transactions on Internet & Information Systems, 2010, v. 4, n. 3, p. 273, doi. 10.3837/tiis.2010.06.005
- By:
- Publication type:
- Article
Class 4 Active RFID Multi-hop Relay System based on IEEE 802.15.4a Low-Rate UWB in Sensor Network.
- Published in:
- KSII Transactions on Internet & Information Systems, 2010, v. 4, n. 3, p. 258, doi. 10.3837/tiis.2010.06.004
- By:
- Publication type:
- Article
Path Loss Exponent Estimation for Indoor Wireless Sensor Positioning.
- Published in:
- KSII Transactions on Internet & Information Systems, 2010, v. 4, n. 3, p. 243, doi. 10.3837/tiis.2010.06.003
- By:
- Publication type:
- Article
Practical Data Transmission in Cluster-Based Sensor Networks.
- Published in:
- KSII Transactions on Internet & Information Systems, 2010, v. 4, n. 3, p. 224, doi. 10.3837/tiis.2010.06.002
- By:
- Publication type:
- Article
AFSO: An Adaptative Frame Size Optimization Mechanism for 802.11 Networks.
- Published in:
- KSII Transactions on Internet & Information Systems, 2010, v. 4, n. 3, p. 205, doi. 10.3837/tiis.2010.06.001
- By:
- Publication type:
- Article
Combining Adaptive Filtering and IF Flows to Detect DDoS Attacks within a Router.
- Published in:
- KSII Transactions on Internet & Information Systems, 2010, v. 4, n. 3, p. 428, doi. 10.3837/tiis.2010.06.014
- By:
- Publication type:
- Article
Semi-trusted Collaborative Framework for Multi-party Computation.
- Published in:
- KSII Transactions on Internet & Information Systems, 2010, v. 4, n. 3, p. 411, doi. 10.3837/tiis.2010.06.013
- By:
- Publication type:
- Article
Identity-based Threshold Broadcast Encryption in the Standard Model.
- Published in:
- KSII Transactions on Internet & Information Systems, 2010, v. 4, n. 3, p. 400, doi. 10.3837/tiis.2010.06.012
- By:
- Publication type:
- Article
Attacking and Repairing the Improved ModOnions Protocol-Tagging Approach.
- Published in:
- KSII Transactions on Internet & Information Systems, 2010, v. 4, n. 3, p. 382, doi. 10.3837/tiis.2010.06.011
- By:
- Publication type:
- Article
Locally Initiating Line-Based Object Association in Large Scale Multiple Cameras Environment.
- Published in:
- KSII Transactions on Internet & Information Systems, 2010, v. 4, n. 3, p. 358, doi. 10.3837/tiis.2010.06.010
- By:
- Publication type:
- Article