Sciweavers

73 search results - page 13 / 15
» Error Detection through Consistency Checking
Sort
View
ETFA
2006
IEEE
15 years 1 months ago
Verification of The Minimum Cost Forwarding Protocol for Wireless Sensor Networks
Wireless sensor networks (WSN) consist of small self-contained devices with computational, sensing and wireless communication capabilities. They allow flexible, powerful, tetherles...
William D. Henderson, Steven Tron
INFOCOM
2009
IEEE
15 years 4 months ago
Null Keys: Limiting Malicious Attacks Via Null Space Properties of Network Coding
—The performance of randomized network coding can suffer significantly when malicious nodes corrupt the content of the exchanged blocks. Previous work have introduced error corr...
Elias Kehdi, Baochun Li
75
Voted
BMCBI
2005
99views more  BMCBI 2005»
14 years 9 months ago
CGH-Profiler: Data mining based on genomic aberration profiles
Background: CGH-Profiler is a program that supports the analysis of genomic aberrations measured by Comparative Genomic Hybridisation (CGH). Comparative genomic hybridisation (CGH...
Falk Schubert, Bernhard Tausch, Stefan Joos, Rolan...
ICDM2
2004
Springer
196views Data Mining» more  ICDM2 2004»
15 years 3 months ago
An Early Warning System for Vehicle Related Quality Data
Vehicle production audit tests, warranty claims and car control unit data are stored in a central data warehouse for data mining analysis. Neural network based part failure rate es...
Matthias Grabert, Markus Prechtel, Tomas Hrycej, W...
ITC
2003
IEEE
148views Hardware» more  ITC 2003»
15 years 2 months ago
HyAC: A Hybrid Structural SAT Based ATPG for Crosstalk
As technology evolves into the deep sub-micron era, signal integrity problems are growing into a major challenge. An important source of signal integrity problems is the crosstalk...
Xiaoliang Bai, Sujit Dey, Angela Krstic