Sciweavers

2945 search results - page 219 / 589
» Noisy Network Coding
Sort
View
INFOCOM
2010
IEEE
15 years 2 months ago
When Watchdog Meets Coding
Abstract—In this paper, we study the problem of misbehavior detection in wireless networks . A commonly adopted approach is to utilize the broadcast nature of the wireless medium...
Guanfeng Liang, Rachit Agarwal, Nitin Vaidya
AINA
2007
IEEE
15 years 10 months ago
Collaborative Signal Reinforcement in Sensor Networks
Nodes in sensor fields and in autonomous swarms of mobile robots need to communicate; this usually requires individual nodes to either consume a significant amount of energy, ca...
Tingting Meng, Peter M. Athanas
124
Voted
ECAL
2007
Springer
15 years 10 months ago
Developmental Neural Heterogeneity Through Coarse-Coding Regulation
Abstract. A coarse-coding regulatory model that facilitates neural heterogeneity through a morphogenetic process is presented. The model demonstrates cellular and tissue extensibil...
Jekanthan Thangavelautham, Gabriele M. T. D'Eleute...
ISCC
2005
IEEE
15 years 9 months ago
A Game Theoretic Analysis of Protocols Based on Fountain Codes
In this paper we analyze a novel paradigm of reliable communications which is not based on the traditional timeout-and-retransmit mechanism of TCP. Our approach, which we call FBP...
Luis López, Antonio Fernández, Vicen...
CANS
2006
Springer
114views Cryptology» more  CANS 2006»
15 years 7 months ago
Achieving Multicast Stream Authentication Using MDS Codes
We address the multicast stream authentication problem when the communication channel is under the control of an opponent who can drop, reorder or inject data. In such a network m...
Christophe Tartary, Huaxiong Wang