Sciweavers

2655 search results - page 197 / 531
» LT Network Codes
Sort
View
127
Voted
WEBI
2009
Springer
15 years 7 months ago
Data Mining for Malicious Code Detection and Security Applications
: Data mining is the process of posing queries and extracting patterns, often previously unknown from large quantities of data using pattern matching or other reasoning techniques....
Bhavani M. Thuraisingham
INFOCOM
2008
IEEE
15 years 7 months ago
MPLOT: A Transport Protocol Exploiting Multipath Diversity Using Erasure Codes
—In this paper, we propose a novel transport protocol that effectively utilizes available bandwidth and diversity gains provided by heterogeneous, highly lossy paths. Our Multi-P...
Vicky Sharma, Shivkumar Kalyanaraman, Koushik Kar,...
110
Voted
RAM
2008
IEEE
172views Robotics» more  RAM 2008»
15 years 7 months ago
VT Position Code Communication Technology and Its Implementation
Eelectronic device technology has been monopolized by binary system for many years. The circs not only makes it impossible to break through the existing technology bottleneck, but...
ShiYing Zhou, GuiHe Qin, YuBo Jin
109
Voted
ICIP
2007
IEEE
15 years 7 months ago
Distributed Compression of Multi-View Images using a Geometrical Coding Approach
In this paper, we propose a distributed compression approach for multi-view images, where each camera efficiently encodes its visual information locally without requiring any col...
Nicolas Gehrig, Pier Luigi Dragotti
105
Voted
QSIC
2007
IEEE
15 years 7 months ago
Synthesizing Component-Based WSN Applications via Automatic Combination of Code Optimization Techniques
Wireless sensor network (WSN) applications sense events in-situ and compute results in-network. Their software components should run on platforms with stringent constraints on nod...
Zhenyu Zhang, W. K. Chan, T. H. Tse