Sciweavers

655 search results - page 28 / 131
» Source Coding for a Multihop Network
Sort
View
GLOBECOM
2009
IEEE
15 years 4 months ago
Reliability-Based Rate Allocation in Wireless Inter-Session Network Coding Systems
— Network coding has recently received increasing attention to improve performance and increase capacity in both wired and wireless communication networks. In this paper, we focu...
Keivan Ronasi, Amir Hamed Mohsenian Rad, Vincent W...
MSN
2005
Springer
15 years 3 months ago
Using MDS Codes for the Key Establishment of Wireless Sensor Networks
Key pre-distribution techniques for security provision of Wireless Sensor Networks (WSNs) have attracted significant interests recently. In these schemes, a relatively small numbe...
Jing Deng, Yunghsiang S. Han
87
Voted
RAID
2001
Springer
15 years 2 months ago
Accurately Detecting Source Code of Attacks That Increase Privilege
Host-based Intrusion Detection Systems (IDS) that rely on audit data exhibit a delay between attack execution and attack detection. A knowledgeable attacker can use this delay to d...
Robert K. Cunningham, Craig S. Stevenson
74
Voted
P2P
2007
IEEE
15 years 3 months ago
Rescuing Tit-for-Tat with Source Coding
Tit-for-tat is widely believed to be the most effective strategy to enforce collaboration among selfish users. However, it has been shown that its usefulness for decentralized an...
Thomas Locher, Stefan Schmid, Roger Wattenhofer
LCN
2003
IEEE
15 years 2 months ago
New Metrics for Dominating Set Based Energy Efficient Activity Scheduling in Ad Hoc Networks
In a multi-hop wireless network, each node is able to send a message to all of its neighbors that are located within its transmission radius. In a flooding task, a source sends th...
Jamil A. Shaikh, Julio Solano-González, Iva...