Sciweavers

2629 search results - page 388 / 526
» Visual Simulation of Flow
Sort
View
ICC
2009
IEEE
239views Communications» more  ICC 2009»
15 years 9 months ago
An Analytical Approach for Throughput Evaluation of Wireless Network Coding
In this paper, we propose a new analytical model for throughput evaluation of wireless network coding. This new approach is based on a probabilistic viewpoint on network coding, i....
Mohammad H. Amerimehr, Farid Ashtiani, Mohammad Ba...
ICC
2009
IEEE
190views Communications» more  ICC 2009»
15 years 9 months ago
Protecting Location Privacy in Large-Scale Wireless Sensor Networks
—In a wireless sensor network, an adversary equipped monitoring antenna can easily overhear packets, which may facilitate identifying the directions of packet flows and trace to ...
Lei Kang
INFOCOM
2009
IEEE
15 years 9 months ago
An Efficient Privacy-Preserving Scheme against Traffic Analysis Attacks in Network Coding
— Privacy threat is one of the critical issues in network coding, where attacks such as traffic analysis can be easily launched by a malicious adversary once enough encoded packe...
Yanfei Fan, Yixin Jiang, Haojin Zhu, Xuemin Shen
ISVC
2009
Springer
15 years 9 months ago
Cartoon Animation Style Rendering of Water
We present a cartoon animation style rendering method for water animation. In an effort to capture and represent crucial features of water observed in traditional cartoon animatio...
Mi You, Jinho Park, Byungkuk Choi, Jun-yong Noh
GLOBECOM
2008
IEEE
15 years 9 months ago
Queuing Performance of Long-Range Dependent Traffic Regulated by Token-Bucket Policers
 Long-range dependence (LRD) is a widely verified property of Internet traffic, which severely affects network performance yielding longer queuing delays. Token-bucket policers ...
Stefano Bregni, Roberto Cioffi, Paolo Giacomazzi