Sciweavers

5056 search results - page 274 / 1012
» Network Coding Theory
Sort
View
141
Voted
AINA
2007
IEEE
15 years 10 months ago
Collaborative Signal Reinforcement in Sensor Networks
Nodes in sensor fields and in autonomous swarms of mobile robots need to communicate; this usually requires individual nodes to either consume a significant amount of energy, ca...
Tingting Meng, Peter M. Athanas
140
Voted
SP
2008
IEEE
15 years 3 months ago
Predictable Design of Network-Based Covert Communication Systems
This paper presents a predictable and quantifiable approach to designing a covert communication system capable of effectively exploiting covert channels found in the various layer...
Ronald William Smith, George Scott Knight
105
Voted
ICALP
1999
Springer
15 years 7 months ago
Average-Case Complexity of Shellsort
We demonstrate an ⍀( pn1ϩ1/p) lower bound on the average-case running time (uniform distribution) of p-pass Shellsort. This is the first nontrivial general lower bound for avera...
Tao Jiang, Ming Li, Paul M. B. Vitányi
122
Voted
ECAL
2007
Springer
15 years 9 months ago
Developmental Neural Heterogeneity Through Coarse-Coding Regulation
Abstract. A coarse-coding regulatory model that facilitates neural heterogeneity through a morphogenetic process is presented. The model demonstrates cellular and tissue extensibil...
Jekanthan Thangavelautham, Gabriele M. T. D'Eleute...
121
Voted
CANS
2006
Springer
114views Cryptology» more  CANS 2006»
15 years 7 months ago
Achieving Multicast Stream Authentication Using MDS Codes
We address the multicast stream authentication problem when the communication channel is under the control of an opponent who can drop, reorder or inject data. In such a network m...
Christophe Tartary, Huaxiong Wang