Sciweavers

11217 search results - page 1973 / 2244
» Network Coding for Wireless Networks
Sort
View
128
Voted
IAW
2003
IEEE
15 years 8 months ago
An Evolutionary Approach to Generate Fuzzy Anomaly Signatures
Abstract— This paper describes the generation of fuzzy signatures to detect some cyber attacks. This approach is an enhancement to our previous work, which was based on the princ...
Fabio A. González, Jonatan Gómez, Ma...
ICDCSW
2003
IEEE
15 years 8 months ago
Adaptive Power Control and Selective Radio Activation for Low-Power Infrastructure-Mode 802.11 LANs
We present an integrated dual approach to reduce power consumption in infrastructure-mode 802.11 wireless LANs. A novel distributed power control algorithm adaptively adjusts the ...
Anmol Sheth, Richard Han
ISMAR
2003
IEEE
15 years 8 months ago
ID CAM: A Smart Camera for Scene Capturing and ID Recognition
An ID recognition system is described that uses optical beacons and a high-speed image sensor. The ID sensor captures a scene like an ordinary camera and recognizes the ID of a be...
Nobuyuki Matsushita, Daisuke Hihara, Teruyuki Ushi...
ITCC
2003
IEEE
15 years 8 months ago
Scalable Layered Multicast with Explicit Congestion Notification
Many Layered Multicast (LM) congestion control schemes have been proposed to serve different users with heterogeneous bandwidth requirements. Most of the LM algorithms suffer from...
Li Zhu, Nirwan Ansari, Zafer Sahinoglu, Anthony Ve...
WETICE
2003
IEEE
15 years 8 months ago
On Optimal Update Policies and Cluster Sizes for 2-Tier Distributed Systems
We try to analyze a generic model for 2-tier distributed systems, exploring the possibility of optimal cluster sizes from an information management perspective, such that the over...
Prasenjit Dey, Anwitaman Datta
« Prev « First page 1973 / 2244 Last » Next »