Sciweavers

257 search results - page 46 / 52
» A Comparative Simulation Study of Wavelet Based Denoising Al...
Sort
View
WORM
2004
13 years 9 months ago
ACT: attachment chain tracing scheme for email virus detection and control
Modern society is highly dependent on the smooth and safe flow of information over communication and computer networks. Computer viruses and worms pose serious threats to the soci...
Jintao Xiong
ETM
2010
257views Economy» more  ETM 2010»
13 years 8 months ago
Implementation and Performance Evaluation of the re-ECN Protocol
Re-inserted ECN (re-ECN) is a proposed TCP/IP extension that informs the routers on a path about the estimated level of congestion. The re-ECN protocol extends the Explicit Congest...
Mirja Kühlewind, Michael Scharf
JNW
2007
80views more  JNW 2007»
13 years 7 months ago
A New Method of Using Sensor Network for Solving Pursuit-Evasion Problem
— Wireless sensor networks offer the potential to significantly improve the performance of pursuers in pursuit-evasion games. In this paper, we study several sensor network syst...
Peng Zhuang, Yi Shang, Hongchi Shi
SECON
2010
IEEE
13 years 5 months ago
Multiple Access Mechanisms with Performance Guarantees for Ad-Hoc Networks
This paper bears on the design and the quantitative evaluation of MAC mechanisms for wireless ad-hoc networks with performance guarantees. By this, we mean mechanisms where each ac...
Paola Bermolen, François Baccelli
ICMCS
2000
IEEE
116views Multimedia» more  ICMCS 2000»
14 years 2 days ago
Non Linear Traffic Modeling of VBR MPEG-2 Video Sources
In this paper, a neural network scheme is presented for modeling VBR MPEG-2 video sources. In particular, three non linear autoregressive models (NAR) are proposed to model the ag...
Anastasios D. Doulamis, Nikolaos D. Doulamis, Stef...