Results 291 to 300 of about 517,878 (310)
Some of the next articles are maybe not open access.
A layered DCT coder for Internet video
Proceedings of 3rd IEEE International Conference on Image Processing, 2002Several compression schemes for Internet video utilize block-based conditional replenishment (CR) where block updates are coded independently of the past. In the current Internet video tools, blocks are compressed with a single-layer representation. We propose a new approach that compresses image blocks using a layered representation.
Martin Vetterli, E. Amir, Steven McCanne
openaire +2 more sources
Physical layer security for Internet of Things networks
2022...
Kırık, Muhammet+2 more
openaire +2 more sources
A cross-layer communication module for the Internet of Things [PDF]
The Internet of Things (IoT) is a novel networking paradigm which allows the communication among all sorts of physical objects over the Internet. The IoT defines a world-wide cyber-physical system with a plethora of applications in the fields of domotics, e-health, goods monitoring and logistics, among others.
Etimad Fadel+3 more
openaire +1 more source
The Internet, IP, and the optical layer
Fifth Asia-Pacific Conference on ... and Fourth Optoelectronics and Communications Conference on Communications,, 1999IP-based services differ fundamentally in many dimensions from traditional voice-bases services. Since today's transport networks were optimized for these traditional services it should be expected that far-reaching changes will be needed if IP becomes dominant.
openaire +2 more sources
Layered Structure and Management in Internet of Things
Future Generation Communication and Networking (FGCN 2007), 2007The development for Internet of Things and RFID technology is described in this paper. A feasible scheme and layered structure is proposed for Internet of Things. Its management is presented according to the demand for Internet of Things in China. The general system contains two parts: computer information subsystem and RFID terminal subsystem, the ...
Shenfeng Qu+4 more
openaire +2 more sources
An investigation of the Internet’s IP-layer connectivity
Computer Communications, 2009The Internet's tremendous value is undoubtedly dependent on its universal connectivity among a great number of heterogeneous networks that are distributed over the world. In recent years, while the Internet's scale has expanded exponentially, the current status of its connectivity is still in the lack of comprehensive and formal study.
Scott Shenker, Li Tang, Yanda Li, Jun Li
openaire +2 more sources
Internet Application-Layer Protocols
2007In the previous chapter, we saw how IP packets carry TCP segments or UDP datagrams across networks. Now it is time to look at what happens in the top layer of a TCP/IP-based network, the application layer. This chapter starts with an explanation of client–server technology, which underlies most Internet activities. We examine the following applications
openaire +2 more sources
Physical layer aware network architecture for the future internet
IEEE Communications Magazine, 2012In this article, physical layer awareness in access, core, and metro networks is addressed, and a Physical Layer Aware Network Architecture Framework for the Future Internet is presented and discussed, as proposed within the framework of the European ICT Project 4WARD.
Cardoso, Filipe D.+8 more
openaire +3 more sources
Facebook as a New Layer of the Internet
2014Paul Levinson lists Facebook, along with the blogosphere, Wikipedia, YouTube, MySpace, Digg and Twitter, as a new “new medium”. There is no doubt that that is true, but only part of a whole truth. From a technical point of view the Internet consists of few layers, starting from the layer of physical medium as cables and routers, ending with the ...
openaire +2 more sources
Internet Banking – A Layered Approach to Security
2004The advent and popularity of the Internet presented the banking industry with both a challenge and an opportunity to utilise this medium. Although internet banking offered customers the comfort of accessing their accounts from any place, there has been fear of exploitation of the inherent weakness in the technology.
S. Ramanarayanan, D. P. Dube
openaire +2 more sources