Sciweavers

2945 search results - page 359 / 589
» Noisy Network Coding
Sort
View
119
Voted
RAID
2010
Springer
15 years 1 months ago
Inferring Protocol State Machine from Real-World Trace
Application-level protocol specifications are helpful for network security management, including intrusion detection, intrusion prevention and detecting malicious code. However, c...
Yipeng Wang, Zhibin Zhang, Li Guo
126
Voted
ICASSP
2009
IEEE
15 years 1 months ago
Enhanced error resilience of video communications for burst losses using an extended ROPE algorithm
Video communications over wireless networks suffers various patterns of losses, including burst losses that cause great degradation in video quality. In this paper, we propose an ...
Yiting Liao, Jerry D. Gibson
152
Voted
WINET
2010
224views more  WINET 2010»
15 years 1 months ago
Hierarchical geographic multicast routing for wireless sensor networks
Wireless sensor networks comprise typically dense deployments of large networks of small wireless capable sensor devices. In such networks, multicast is a fundamental routing servi...
Dimitrios Koutsonikolas, Saumitra M. Das, Y. Charl...
131
Voted
DDECS
2009
IEEE
171views Hardware» more  DDECS 2009»
15 years 10 months ago
Packet header analysis and field extraction for multigigabit networks
—Packet header analysis and extraction of header fields needs to be performed in all network devices. As network speed is increasing quickly, high speed packet header processing...
Petr Kobierský, Jan Korenek, Libor Polcak
127
Voted
SRDS
2008
IEEE
15 years 9 months ago
SeNDORComm: An Energy-Efficient Priority-Driven Communication Layer for Reliable Wireless Sensor Networks
In many reliable Wireless Sensor Network (WSN) applications, messages have different priorities depending on urgency or importance. For example, a message reporting the failure of...
Vinaitheerthan Sundaram, Saurabh Bagchi, Yung-Hsia...