Sciweavers

2945 search results - page 242 / 589
» Noisy Network Coding
Sort
View
NDSS
2003
IEEE
15 years 9 months ago
Access Control Based on Execution History
Security is a major, frequent concern in extensible software systems such as Java Virtual Machines and the Common Language Runtime. These systems aim to enable simple, classic app...
Martín Abadi, Cédric Fournet
AINA
2010
IEEE
15 years 3 months ago
Compensation of Sensors Nonlinearity with Neural Networks
—This paper describes a method of linearizing the nonlinear characteristics of many sensors using an embedded neural network. The proposed method allows for complex neural networ...
Nicholas J. Cotton, Bogdan M. Wilamowski
GLOBECOM
2008
IEEE
15 years 10 months ago
A Novel Topology Control Scheme for Future Wireless Mesh Networks
—In this paper, we address the topology control issue for future wireless mesh networks (WMNs). In particular, we propose a novel topology control scheme that attempts to maximiz...
Kejie Lu, Tao Zhang, Yi Qian, Shengli Fu
149
Voted
ADHOCNOW
2008
Springer
15 years 5 months ago
A Prediction Based Cross-Layer MAC/PHY Interface for CDMA Ad Hoc Networks
Variable environments in ad hoc networks require a joint control of physical (PHY) and medium access control (MAC) layers resources in order to optimize performance. In this paper,...
Pegdwindé Justin Kouraogo, François ...
ICIP
2004
IEEE
16 years 5 months ago
JPEG2000 vs. JPEG from an image retrieval point of view
It is well known that JPEG2000 has a variety of advantages over its predecessor JPEG. JPEG2000 not only allows images to be coded with clearly better visual image quality, it also...
Gerald Schaefer