Sciweavers

11217 search results - page 2058 / 2244
» Network Coding for Wireless Networks
Sort
View
ICMCS
2009
IEEE
138views Multimedia» more  ICMCS 2009»
14 years 8 months ago
A hybrid FEC-ARQ protocol for low-delay lossless sequential data streaming
Interactive Internet Applications that rely on sequential streams for lossless data exchange often use retransmission protocols (e.g. TCP) for reliability and the guarantee of seq...
Ying-zong Huang, Sanjeev Mehrotra, Jin Li
AINA
2010
IEEE
14 years 8 months ago
TCP Testing: How Well Does ns2 Match Reality?
New transport protocols continue to appear as alternatives to the Transmission Control Protocol (TCP). Many of these are are designed to address TCP's inefficiency in operatin...
Martin Bateman, Saleem N. Bhatti
SIAMDM
2010
101views more  SIAMDM 2010»
14 years 5 months ago
Rationality and Strongly Polynomial Solvability of Eisenberg--Gale Markets with Two Agents
Inspired by the convex program of Eisenberg and Gale which captures Fisher markets with linear utilities, Jain and Vazirani [STOC, 2007] introduced the class of EisenbergGale (EG)...
Deeparnab Chakrabarty, Nikhil R. Devanur, Vijay V....
TWC
2010
14 years 5 months ago
Interference-limited opportunistic relaying with reactive sensing
This work evaluates opportunistic relaying in the presence of thermal noise as well as interference, when channel sensing is conducted reactively, in slow fading environments. The ...
Aggelos Bletsas, Antonis G. Dimitriou, John N. Sah...
DIMVA
2011
14 years 2 months ago
Operating System Interface Obfuscation and the Revealing of Hidden Operations
Many software security solutions—including malware analyzers, information flow tracking systems, auditing utilities, and host-based intrusion detectors—rely on knowledge of s...
Abhinav Srivastava, Andrea Lanzi, Jonathon T. Giff...
« Prev « First page 2058 / 2244 Last » Next »