Sciweavers

5056 search results - page 227 / 1012
» Network Coding Theory
Sort
View
126
Voted
MOBIHOC
2005
ACM
16 years 2 months ago
Hybrid sensor networks: a small world
In this paper, we investigate the use of limited infrastructure, in the form of wires, for improving the energy efficiency of a wireless sensor network. We call such a sensor netw...
Gaurav Sharma, Ravi Mazumdar
ICFP
2003
ACM
16 years 3 months ago
Dynamic rebinding for marshalling and update, with destruct-time?
Most programming languages adopt static binding, but for distributed programming an exclusive reliance on static binding is too restrictive: dynamic binding is required in various...
Gavin M. Bierman, Michael W. Hicks, Peter Sewell, ...
101
Voted
WCNC
2008
IEEE
15 years 9 months ago
Two-Stage Code Acquisition Employing Search Space Reduction and Iterative Detection in the DS-UWB Downlink
— In this paper we propose and investigate an iterative code acquisition scheme assisted by both search space reduction and iterative Massage Passing (MP), which was designed for...
Seung Hwan Won, Lajos Hanzo
119
Voted
ICMCS
2007
IEEE
149views Multimedia» more  ICMCS 2007»
15 years 9 months ago
Joint Source Coding and Data Rate Adaptation for Multi-User Wireless Video Transmission
Much attention has been paid to the problem of optimally utilizing resources such as spectrum, power and time in order to achieve the best video delivery quality in wireless commu...
Fan Zhai, Zhu Li, Aggelos K. Katsaggelos
DSN
2007
IEEE
15 years 9 months ago
An Architectural Approach to Preventing Code Injection Attacks
Code injection attacks, despite being well researched, continue to be a problem today. Modern architectural solutions such as the NX-bit and PaX have been useful in limiting the a...
Ryan Riley, Xuxian Jiang, Dongyan Xu