Sciweavers

2945 search results - page 364 / 589
» Noisy Network Coding
Sort
View
INFOSCALE
2006
ACM
15 years 9 months ago
Simulating non-scanning worms on peer-to-peer networks
Millions of Internet users are using large-scale peerto-peer (P2P) networks to share content files today. Many other mission-critical applications, such as Internet telephony and...
Guanling Chen, Robert S. Gray
SCOPES
2004
Springer
15 years 8 months ago
An Integer Linear Programming Approach to Classify the Communication in Process Networks
New embedded signal processing architectures are emerging that are composed of loosely coupled heterogeneous components like CPUs or DSPs, specialized IP cores, reconfigurable uni...
Alexandru Turjan, Bart Kienhuis, Ed F. Deprettere
INFOCOM
2003
IEEE
15 years 8 months ago
Impact of Interferences on Connectivity in Ad Hoc Networks
Abstract— We study the impact of interferences on the connectivity of large-scale ad-hoc networks, using percolation theory. We assume that a bi-directional connection can be set...
Olivier Dousse, François Baccelli, Patrick ...
EPIA
2003
Springer
15 years 8 months ago
Using CLIPS to Detect Network Intrusions
We describe how to build a network intrusion detection sensor by slightly modifying NASA’s CLIPS source code introducing some new features. An overview of the system is presente...
Pedro Alípio, Paulo Carvalho, José N...
ICC
2007
IEEE
152views Communications» more  ICC 2007»
15 years 7 months ago
Characterizing and Exploiting Partial Interference in Wireless Mesh Networks
Abstract-- In evaluating the performance of a wireless network, the interference between wireless links plays a key role. In previous works, interference was assumed to be a binary...
Ka-Hung Hui, Wing Cheong Lau, On-Ching Yue