Abstract -We investigate the achievable rate of data transmission from sources to sinks through a multiple-relay network. We study achievable rates for omniscient coding, in which ...
Abstract. In this work we investigate bounds on throughput and delay performance of a scheduling protocol that derives its decisions from codes traditionally used to correct or det...
Application-level protocol specifications are helpful for network security management, including intrusion detection, intrusion prevention and detecting malicious code. However, c...
This paper presents the first analysis on the energy efficiency of LT codes with Non-Coherent M-ary Frequency Shift Keying (NCMFSK), known as green modulation [1], in a proactive W...
Jamshid Abouei, J. David Brown, Konstantinos N. Pl...
Understanding detailed changes done to source code is of great importance in software maintenance. We present Code Flows, a method to visualize the evolution of source code geared...