Sciweavers

3818 search results - page 719 / 764
» A Comparative Study on the Performance of Wireless Sensor Ne...
Sort
View
DRM
2003
Springer
14 years 1 months ago
Analysis of security vulnerabilities in the movie production and distribution process
Unauthorized copying of movies is a major concern for the motion picture industry. While unauthorized copies of movies have been distributed via portable physical media for some t...
Simon Byers, Lorrie Faith Cranor, David P. Kormann...
ICC
2008
IEEE
127views Communications» more  ICC 2008»
14 years 2 months ago
Delay Analysis of Distributed Reservation Protocol with UWB Shadowing Channel for WPAN
— Ultra-wideband (UWB) technology is expected to provide high data rate services for future wireless personal area networks (WPANs). The WiMedia Alliance recently has launched it...
Kuang-Hao Liu, Xuemin Shen, Ruonan Zhang, Lin Cai
CCR
1998
90views more  CCR 1998»
13 years 8 months ago
On the generation and use of TCP acknowledgments
This paper presents a simulation study of various TCP acknowledgment generation and utilization techniques. We investigate the standard version of TCP and the two standard acknowl...
Mark Allman
JMLR
2012
11 years 11 months ago
Random Search for Hyper-Parameter Optimization
Grid search and manual search are the most widely used strategies for hyper-parameter optimization. This paper shows empirically and theoretically that randomly chosen trials are ...
James Bergstra, Yoshua Bengio
CONEXT
2008
ACM
13 years 10 months ago
Online estimation of RF interference
Increased AP density in enterprise WLANs leads to increasing RF interference and decreasing performance. An important step towards mitigating this problem is to construct precise ...
Nabeel Ahmed, Usman Ismail, Srinivasan Keshav, Kon...