Sciweavers

17951 search results - page 162 / 3591
» Network Coding Applications
Sort
View
CORR
2006
Springer
92views Education» more  CORR 2006»
15 years 2 months ago
Myopic Coding in Wireless Networks
Abstract -We investigate the achievable rate of data transmission from sources to sinks through a multiple-relay network. We study achievable rates for omniscient coding, in which ...
Lawrence Ong, Mehul Motani
ADHOCNOW
2005
Springer
15 years 8 months ago
Reed-Solomon and Hermitian Code-Based Scheduling Protocols for Wireless Ad Hoc Networks
Abstract. In this work we investigate bounds on throughput and delay performance of a scheduling protocol that derives its decisions from codes traditionally used to correct or det...
Carlos H. Rentel, Thomas Kunz
RAID
2010
Springer
15 years 25 days ago
Inferring Protocol State Machine from Real-World Trace
Application-level protocol specifications are helpful for network security management, including intrusion detection, intrusion prevention and detecting malicious code. However, c...
Yipeng Wang, Zhibin Zhang, Li Guo
CORR
2010
Springer
183views Education» more  CORR 2010»
15 years 2 months ago
On the Energy Efficiency of LT Codes in Proactive Wireless Sensor Networks
This paper presents the first analysis on the energy efficiency of LT codes with Non-Coherent M-ary Frequency Shift Keying (NCMFSK), known as green modulation [1], in a proactive W...
Jamshid Abouei, J. David Brown, Konstantinos N. Pl...
CGF
2008
129views more  CGF 2008»
15 years 2 months ago
Code Flows: Visualizing Structural Evolution of Source Code
Understanding detailed changes done to source code is of great importance in software maintenance. We present Code Flows, a method to visualize the evolution of source code geared...
Alexandru Telea, David Auber