Sciweavers

377 search results - page 19 / 76
» Constrained Codes as Networks of Relations
Sort
View
INFOCOM
1996
IEEE
13 years 12 months ago
Network Security via Reverse Engineering of TCP Code: Vulnerability Analysis and Proposed Solutions
The Transmission Control Protocol Internet Protocol TCP IP 1 suite is a very widely used technique that is employed to interconnect computing facilities in modern network environm...
Biswaroop Guha, Biswanath Mukherjee
ICANN
2003
Springer
14 years 27 days ago
Optimizing Property Codes in Protein Data Reveals Structural Characteristics
We search for assignments of numbers to the amino acids (property codes) that maximize the autocorrelation function signal in given protein sequence data by an iterative method. Ou...
Olaf Weiss, Andreas Ziehe, Hanspeter Herzel
JSAC
2006
101views more  JSAC 2006»
13 years 7 months ago
Distributed space-time coding for multihop transmission in power line communication networks
In this paper, we consider transmission in relatively wide-stretched power line communication (PLC) networks, where repeaters are required to bridge the source-to-destination dista...
Lutz H.-J. Lampe, Robert Schober, Simon Yiu
TWC
2010
13 years 2 months ago
Toward network coding-based protocols for data broadcasting in wireless Ad Hoc networks
In this paper we consider practical dissemination algorithms exploiting network coding for data broadcasting in ad hoc wireless networks. For an efcient design, we analyze issues r...
Alfred Asterjadhi, Elena Fasolo, Michele Rossi, J&...
GECCO
2008
Springer
123views Optimization» more  GECCO 2008»
13 years 8 months ago
On hopeful monsters, neutral networks and junk code in evolving L-systems
This paper investigates L-system evolution through experiments with a simulation platform of virtual plants. The conducted simulations vary the occurrence probability of terminal ...
Stefan Bornhofen, Claude Lattaud