Sciweavers

5056 search results - page 397 / 1012
» Network Coding Theory
Sort
View
DEXAW
1999
IEEE
98views Database» more  DEXAW 1999»
15 years 9 months ago
Shaping the Research Agenda for Security in E-Commerce
In this paper, we overview the current state-of-the-art and future trends in network security and argue that the security requirements of electronic commerce (e-commerce) applicat...
Rolf Oppliger
143
Voted
BIOINFORMATICS
2006
142views more  BIOINFORMATICS 2006»
15 years 4 months ago
Intervention in a family of Boolean networks
Motivation: Intervention in a gene regulatory network is used to avoid undesirable states, such as those associated with a disease. Several types of intervention have been studied...
Ashish Choudhary, Aniruddha Datta, Michael L. Bitt...
DCC
2002
IEEE
16 years 4 months ago
Codecell Contiguity in Optimal Fixed-Rate and Entropy-Constrained Network Scalar Quantizers
We consider the properties of optimal xed-rate and entropy-constrained scalar quantizers for nite alphabet sources. In particular, w econsider conditions under which the optimal s...
Michelle Effros, Dan Muresan
ICC
2009
IEEE
186views Communications» more  ICC 2009»
15 years 11 months ago
Power Allocations for Adaptive Distributed MIMO Multi-Hop Networks
—Distributed MIMO multi-hop relaying is one of the most promising technologies that permits cost-effective improvement of coverage, data rate and end-to-end (e2e) user experience...
Yidong Lang, Dirk Wübben, Karl-Dirk Kammeyer
GECCO
2004
Springer
116views Optimization» more  GECCO 2004»
15 years 10 months ago
A Comment on Opt-AiNET: An Immune Network Algorithm for Optimisation
Verifying the published results of algorithms is part of the usual research process. This helps to both validate the existing literature, but also quite often allows for new insigh...
Jon Timmis, Camilla Edmonds