Sciweavers

5234 search results - page 892 / 1047
» Simulation of Computer Network Attacks
Sort
View
145
Voted
MM
2009
ACM
163views Multimedia» more  MM 2009»
15 years 10 months ago
Peer-assisted packet loss repair for IPTV video multicast
Emerging IPTV technology uses source-specific IP multicast to deliver TV programs to the end-users. To provide timely and reliable services over the error-prone DSL access networ...
Zhi Li, Xiaoqing Zhu, Ali C. Begen, Bernd Girod
129
Voted
CEC
2008
IEEE
15 years 10 months ago
Reduced polynomial neural swarm net for classification task in data mining
—In this paper, we proposed a reduced polynomial neural swarm net (RPNSN) for the task of classification. Classification task is one of the most studied tasks of data mining. In ...
Bijan Bihari Misra, Satchidananda Dehuri, Pradipta...
136
Voted
IJCNN
2008
IEEE
15 years 10 months ago
Adaptation of barn owl localization system with spike timing dependent plasticity
— To localize a seen object, the superior colliculus of the barn owl integrates the visual and auditory localization cues which are accessed from the sensory system of the brain....
Juan Huo, Alan F. Murray, Leslie Smith, Zhijun Yan...
127
Voted
WCNC
2008
IEEE
15 years 10 months ago
An Opportunistic Scheduling Scheme with Minimum Data-Rate Guarantees for OFDMA
Abstract—We tackle the problem of providing minimum datarate guarantees for different classes-of-service in an OFDMAbased network, while obtaining a high system throughput. Our a...
Razvan Pitic, Antonio Capone
140
Voted
WCNC
2008
IEEE
15 years 10 months ago
Analysis of Distributed Reservation Protocol for UWB-Based WPANs with ECMA-368 MAC
— The recent ECMA-368 standard specifies the use of ultra wideband (UWB) technology for high rate communications in wireless personal area networks (WPANs). This paper proposes ...
Nasim Arianpoo, Yuxia Lin, Vincent W. S. Wong, Att...