Sciweavers

5056 search results - page 254 / 1012
» Network Coding Theory
Sort
View
142
Voted
TCOM
2010
220views more  TCOM 2010»
15 years 1 months ago
Fiber fault PON monitoring using optical coding: Effects of customer geographic distribution
Abstract—We analyze the performance of fiber fault monitoring of a PON using a centralized, passive optical coding (OC) system. We develop an expression for the detected monitor...
Mohammad M. Rad, Habib Fathallah, Leslie A. Rusch
126
Voted
IPPS
2007
IEEE
15 years 9 months ago
A Strategyproof Mechanism for Scheduling Divisible Loads in Linear Networks
In this paper we augment DLT (Divisible Load Theory) with incentives such that it is beneficial for processors to report their true processing capacity and compute their assignme...
Thomas E. Carroll, Daniel Grosu
WWW
2008
ACM
16 years 4 months ago
Protecting web services from remote exploit code: a static analysis approach
We propose STILL, a signature-free remote exploit binary code injection attack blocker to protect web servers and web applications. STILL is robust to almost all anti-signature, a...
Xinran Wang, Yoon-chan Jhi, Sencun Zhu, Peng Liu
141
Voted
ICC
2008
IEEE
127views Communications» more  ICC 2008»
15 years 10 months ago
Power and Bandwidth Allocation in Cooperative Dirty Paper Coding
—The cooperative dirty paper coding (DPC) rate region is investigated in a two-transmitter two-receiver network with full channel state information available at all terminals. Th...
Chris T. K. Ng, Nihar Jindal, Andrea J. Goldsmith,...
123
Voted
WCNC
2008
IEEE
15 years 10 months ago
Cooperative Communications Using Scalable, Medium Block-length LDPC Codes
Abstract— Cooperative communications has received increasing attention in recent years because of the ubiquity of wireless devices. Each year more mobile computing devices enter ...
Marjan Karkooti, Joseph R. Cavallaro