Sciweavers

5056 search results - page 248 / 1012
» Network Coding Theory
Sort
View
130
Voted
TII
2008
176views more  TII 2008»
15 years 3 months ago
Adaptive Multilevel Code Update Protocol for Real-Time Sensor Operating Systems
In wireless sensor networks each sensor node has very limited resources, and it is very difficult to find and collect them. For this reason, updating or adding programs in sensor n...
Sangho Yi, Hong Min, Yookun Cho, Jiman Hong
ICMCS
2008
IEEE
194views Multimedia» more  ICMCS 2008»
15 years 10 months ago
Sparse FEC codes for flexible media protection
In this paper, we study block codes that are optimized to recover some lost source data even in case when full recovery is not possible. Conventionally, block codes designed for p...
Jari Korhonen, Pascal Frossard
RAID
2001
Springer
15 years 8 months ago
Accurately Detecting Source Code of Attacks That Increase Privilege
Host-based Intrusion Detection Systems (IDS) that rely on audit data exhibit a delay between attack execution and attack detection. A knowledgeable attacker can use this delay to d...
Robert K. Cunningham, Craig S. Stevenson
142
Voted
DSN
2008
IEEE
15 years 5 months ago
Reliability of flat XOR-based erasure codes on heterogeneous devices
XOR-based erasure codes are a computationallyefficient means of generating redundancy in storage systems. Some such erasure codes provide irregular fault tolerance: some subsets o...
Kevin M. Greenan, Ethan L. Miller, Jay J. Wylie
140
Voted
TIT
2010
105views Education» more  TIT 2010»
14 years 10 months ago
Multigroup ML decodable collocated and distributed space-time block codes
In this paper, collocated and distributed space-time block codes (DSTBCs) which admit multigroup maximum-likelihood (ML) decoding are studied. First, the collocated case is conside...
G. Susinder Rajan, B. Sundar Rajan