Sciweavers

2654 search results - page 57 / 531
» Space-Time Network Coding
Sort
View
98
Voted
DIMVA
2009
15 years 1 months ago
Yataglass: Network-Level Code Emulation for Analyzing Memory-Scanning Attacks
Remote code-injection attacks are one of the most frequently used attacking vectors in computer security. To detect and analyze injected code (often called shellcode), some researc...
Makoto Shimamura, Kenji Kono
TIT
2010
98views Education» more  TIT 2010»
14 years 7 months ago
Pairwise intersession network coding on directed networks
When there exists only a single multicast session in a directed acyclic/cyclic network, the existence of a network coding solution is characterized by the classic min-cut/max-flow ...
Chih-Chun Wang, Ness B. Shroff
ICDCS
2008
IEEE
15 years 7 months ago
Optimized Multipath Network Coding in Lossy Wireless Networks
Network coding has been a prominent approach to a series of problems that used to be considered intractable with traditional transmission paradigms. Recent work on network coding ...
Xinyu Zhang, Baochun Li
105
Voted
NETWORKING
2007
15 years 1 months ago
Enhancing Guaranteed Delays with Network Coding
—For networks providing QoS guarantees, this paper determines and evaluates the worst case end-to-end delays for strategies based on network coding and multiplexing. It is shown ...
Ali Mahmino, Jérôme Lacan, Christian ...
102
Voted
CODES
2007
IEEE
15 years 20 days ago
Automotive networks: are new busses and gateways the answer or just another challenge?
Rolf Ernst, Gernot Spiegelberg, Thomas Weber, Herm...