Sciweavers

43 search results - page 4 / 9
» A protocol-independent technique for eliminating redundant n...
Sort
View
ITIIS
2010
223views more  ITIIS 2010»
13 years 6 months ago
An Adaptive FEC Mechanism Using Cross-layer Approach to Enhance Quality of Video Transmission over 802.11 WLANs
Forward Error Correction (FEC) techniques have been adopted to overcome packet losses and to improve the quality of video delivery. The efficiency of the FEC has been significantl...
Longzhe Han, Sungjun Park, Seung-Seok Kang, Hoh Pe...
ICANN
2007
Springer
13 years 11 months ago
An Efficient Method for Pruning the Multilayer Perceptron Based on the Correlation of Errors
Abstract. In this paper we present a novel method for pruning redundant weights of a trained multilayer Perceptron (MLP). The proposed method is based on the correlation analysis o...
Cláudio M. S. Medeiros, Guilherme De A. Bar...
ICMCS
2007
IEEE
112views Multimedia» more  ICMCS 2007»
14 years 1 months ago
Peer-to-Peer Streaming with Hierarchical Network Coding
Abstract— In recent years, Content Delivery Networks (CDN) and Peerto-Peer (P2P) networks have emerged as two effective paradigms for delivering multimedia contents over the Inte...
Kien Nguyen, Thinh Nguyen, Sen-Ching S. Cheung
DFT
2003
IEEE
132views VLSI» more  DFT 2003»
14 years 24 days ago
Level-Hybrid Optoelectronic TESH Interconnection Network
This paper discusses a hybrid optoelectronic scheme for a new interconnection network, "Tori connected mESHes (TESH)". The major features of TESH are the following: it i...
Vijay K. Jain, Glenn H. Chapman
CCS
2003
ACM
14 years 23 days ago
Robust correlation of encrypted attack traffic through stepping stones by manipulation of interpacket delays
Network based intruders seldom attack directly from their own hosts, but rather stage their attacks through intermediate “stepping stones” to conceal their identity and origin...
Xinyuan Wang, Douglas S. Reeves