Sciweavers

5056 search results - page 276 / 1012
» Network Coding Theory
Sort
View
139
Voted
ESANN
2007
15 years 5 months ago
Adaptive Global Metamodeling with Neural Networks
Due to the scale and computational complexity of current simulation codes, metamodels (or surrogate models) have become indispensable tools for exploring and understanding the desi...
Dirk Gorissen, Wouter Hendrickx, Tom Dhaene
133
Voted
WSC
2004
15 years 5 months ago
Peeking Into the Black Box: Some Art and Science to Visualizing Agent-Based Models
This paper explores current metaphors for visualizing agent-based models. Metaphors include grid, network, ndimensional cubes and landscape visualization techniques. A final secti...
Stephen M. Guerin
101
Voted
SIGECOM
2010
ACM
149views ECommerce» more  SIGECOM 2010»
15 years 8 months ago
A behavioral study of bargaining in social networks
We report on a series of highly controlled human subject experiments in networked bargaining. The basic interaction between two players is the decision of how to share a mutual pa...
Tanmoy Chakraborty, J. Stephen Judd, Michael Kearn...
134
Voted
INFOCOM
2009
IEEE
15 years 10 months ago
Rateless Coding with Feedback
The erasure resilience of rateless codes, such as Luby-Transform (LT) codes, makes them particularly suitable to a wide variety of loss-prone wireless and sensor network applicati...
Andrew Hagedorn, Sachin Agarwal, David Starobinski...
143
Voted
CCS
2008
ACM
15 years 5 months ago
Code injection attacks on harvard-architecture devices
Harvard architecture CPU design is common in the embedded world. Examples of Harvard-based architecture devices are the Mica family of wireless sensors. Mica motes have limited me...
Aurélien Francillon, Claude Castelluccia