Sciweavers

2945 search results - page 422 / 589
» Noisy Network Coding
Sort
View
BC
1998
94views more  BC 1998»
14 years 10 months ago
A neural network study of precollicular saccadic averaging
Saccadic averaging is the phenomenon that two simultaneously presented retinal inputs result in a saccade with an endpoint located on an intermediate position between the two stimu...
Karin P. Krommenhoek, W. A. J. J. Wiegerinck
IEPOL
2010
102views more  IEPOL 2010»
14 years 9 months ago
An antitrust analysis of the case for wireless network neutrality
The ongoing debate about possible implementation of regulatory rules requiring “network neutrality” for wireless telecommunications services is inherently about whether to imp...
Gregory L. Rosston, Michael D. Topper
MOBIHOC
2008
ACM
15 years 10 months ago
Improving sensor network immunity under worm attacks: a software diversity approach
Because of cost and resource constraints, sensor nodes do not have a complicated hardware architecture or operating system to protect program safety. Hence, the notorious buffer-o...
Yi Yang, Sencun Zhu, Guohong Cao
AP2PS
2009
IEEE
15 years 5 months ago
Detection of Encrypted Traffic in eDonkey Network through Application Signatures
—Peer-to-peer file sharing applications became very popular, being responsible for a large percentage of the network traffic. However, peer-to-peer traffic may compromise the per...
Mário M. Freire, David A. Carvalho, Manuela...
SENSYS
2009
ACM
15 years 5 months ago
Run time assurance of application-level requirements in wireless sensor networks
Continuous and reliable operation of WSNs is notoriously difficult to guarantee due to hardware degradation and environmental changes. In this paper, we propose and demonstrate a ...
Jingyuan Li, Yafeng Wu, Krasimira Kapitanova, John...