Sciweavers

2945 search results - page 297 / 589
» Noisy Network Coding
Sort
View
122
Voted
IPPS
2007
IEEE
15 years 10 months ago
An Approach to Detect Executable Content for Anomaly Based Network Intrusion Detection
Since current internet threats contain not only malicious codes like Trojan or worms, but also spyware and adware which do not have explicit illegal content, it is necessary to hav...
Like Zhang, Gregory B. White
ICOIN
2004
Springer
15 years 9 months ago
On Generating Random Network Structures: Connected Graphs
Abstract. In this paper we present the set of base algorithms for generating connected random graphs (RG). RG can be used for testing different algorithms on networks. The fast al...
Alexey S. Rodionov, Hyunseung Choo
SIGMETRICS
2010
ACM
175views Hardware» more  SIGMETRICS 2010»
15 years 3 months ago
Elon: enabling efficient and long-term reprogramming for wireless sensor networks
We present a new mechanism called Elon for enabling efficient and long-term reprogramming in wireless sensor networks. Elon reduces the transferred code size significantly by intr...
Wei Dong, Yunhao Liu, Xiaofan Wu, Lin Gu, Chun Che...
COMSUR
1999
87views more  COMSUR 1999»
15 years 3 months ago
MPEG-2 Transport over ATM Networks
The growth of Asynchronous Transfer Mode (ATM) technology and the maturity of coding standards have made the large-scale deployment of high-quality audiovisual services possible. ...
Christos Tryfonas, Anujan Varma
CORR
2010
Springer
77views Education» more  CORR 2010»
15 years 3 months ago
The Binary-Symmetric Parallel-Relay Network
We present capacity results of the binary-symmetric parallel-relay network, where there is one source, one destination, and K relays in parallel. We show that forwarding relays, wh...
Lawrence Ong, Sarah J. Johnson, Christopher M. Kel...