Sciweavers

2945 search results - page 295 / 589
» Noisy Network Coding
Sort
View
ICDCS
2011
IEEE
14 years 3 months ago
JR-SND: Jamming-Resilient Secure Neighbor Discovery in Mobile Ad Hoc Networks
Abstract—Secure neighbor discovery is fundamental to mobile ad hoc networks (MANETs) deployed in hostile environments and refers to the process in which two neighboring nodes exc...
Rui Zhang 0007, Yanchao Zhang, Xiaoxia Huang
124
Voted
LCN
2006
IEEE
15 years 9 months ago
Efficient Packet Processing in User-Level OSes: A Study of UML
Network server consolidation has become popular through recent virtualization technology that builds secure, isolated network systems on shared hardware. One of the virtualization...
Younggyun Koh, Calton Pu, Sapan Bhatia, Charles Co...
110
Voted
DATE
2005
IEEE
121views Hardware» more  DATE 2005»
15 years 9 months ago
Fault-Trajectory Approach for Fault Diagnosis on Analog Circuits
This issue discusses the fault-trajectory approach suitability for fault diagnosis on analog networks. Recent works have shown promising results concerning a method based on this ...
Carlos Eduardo Savioli, Claudio C. Czendrodi, Jos&...
DEXAW
1999
IEEE
98views Database» more  DEXAW 1999»
15 years 8 months ago
Shaping the Research Agenda for Security in E-Commerce
In this paper, we overview the current state-of-the-art and future trends in network security and argue that the security requirements of electronic commerce (e-commerce) applicat...
Rolf Oppliger
120
Voted
DCC
2002
IEEE
16 years 3 months ago
Codecell Contiguity in Optimal Fixed-Rate and Entropy-Constrained Network Scalar Quantizers
We consider the properties of optimal xed-rate and entropy-constrained scalar quantizers for nite alphabet sources. In particular, w econsider conditions under which the optimal s...
Michelle Effros, Dan Muresan