Sciweavers

792 search results - page 102 / 159
» Constrained Ramsey Numbers
Sort
View
125
Voted
NDSS
2008
IEEE
15 years 7 months ago
Analyzing Privacy in Enterprise Packet Trace Anonymization
Accurate network measurement through trace collection is critical for advancing network design and for maintaining secure, reliable networks. Unfortunately, the release of network...
Bruno F. Ribeiro, Weifeng Chen, Gerome Miklau, Don...
SECURWARE
2008
IEEE
15 years 7 months ago
Fast Algorithms for Local Inconsistency Detection in Firewall ACL Updates
Filtering is a very important issue in next generation networks. These networks consist of a relatively high number of resource constrained devices with very special features, suc...
Sergio Pozo Hidalgo, Rafael Ceballos, Rafael M. Ga...
VTC
2008
IEEE
239views Communications» more  VTC 2008»
15 years 7 months ago
Cross-Layer and Path Priority Scheduling Based Real-Time Video Communications over Wireless Sensor Networks
—This paper addresses the problem of real-time video streaming over a bandwidth and energy constrained wireless sensor network (WSN). Considering the compressed video bit stream ...
Min Chen, Victor C. M. Leung, Shiwen Mao, Ming Li
126
Voted
CISS
2007
IEEE
15 years 7 months ago
On Capacity of Automatic Target Recognition Systems Under the Constraint of PCA-Encoding
Limiting capabilities of practical recognition systems are determined by a variety of factors that include source encoding techniques, quality of images, complexity of underlying ...
Xiaohan Chen, Natalia A. Schmid
COMSWARE
2007
IEEE
15 years 7 months ago
A Peer-to-Peer Scheme to Discover and Select QoS Enhanced Alternate Paths
— Increasing number of communication softwares are built on distributed architectures based on the Peer-toPeer (P2P) model, such as Skype [1], and PeerCast [2]. This model provid...
Thierry Rakotoarivelo, Patrick Sénac, Aruna...