Networking/Data Transmission

Latest Innovations

Ripple: Communicating through Physical Vibration

 

A novel technique for data transmission that uses vibration motors in all cell phones as transmitters and accelerometers as receivers. By carefully regulating the...

User-Centric Distribution and Sharing of Genomic and Health Data

 

Professor Roy Campbell and team from the University of IL have developed a novel system, implemented via a mobile app, to establish a more flexible and scalable...

Method and System for Distributed, Localized Authentiaction in the Framework of 802.11i

 

 

A method for controlling Internet access of a mobile device by using a communication system having a number of access points includes the steps of...

Method for Exchanging Messages and Verifying the Authenticity of the Messages in an Ad Hoc Network

 

 

A method for exchanging messages containing reliable information between nodes in an ad hoc network, such as a vehicle ad hoc network. The method includes...

A Method for Transaction Dependency Graph Construction Using Signal Injection

 

 

A method for measuring system response sensitivity, using live traffic and an analysis that converts randomly arriving stimuli and reactions to the stimuli...

Scalable System Software for a Gigabit Active Router

 

 

In the present scalable system routing method, received packets are associating with threads for processing the received packets. While a previously...

ZPEG [Vosaic]

 

 

For transmitting digital video information over a network such as the Internet, a hybrid coding scheme (FIGS. 9-18) with wavelet I frame coding and H.263...

Fair Scheduling and Medium Access in Wireless Packet Networks

 

 

A wireless shared channel network packet communication method emulates fluid flow fair scheduling. Errors inherent in wireless communication and...

Method for Allocating Multiple Authentication Certificates to Vehicles in a Vehicle -to-Vehicle Communication Network

 

 

In a vehicle-to-vehicle communication network utilizing PKI security methods to protect communications and in which the PKI encryption utilizes a...