Sciweavers

1733 search results - page 168 / 347
» Digital data networks design using genetic algorithms
Sort
View
PEWASUN
2007
ACM
13 years 10 months ago
Worst-case lifetime computation of a wireless sensor network by model-checking
Wireless Sensor Network (WSN) technology is now mature enough to be used in numerous application domains. However, due to the restricted amount of energy usually allocated to each...
Laurent Mounier, Ludovic Samper, Wassim Znaidi
IMC
2010
ACM
13 years 7 months ago
The effect of packet loss on redundancy elimination in cellular wireless networks
Network-level redundancy elimination (RE) algorithms reduce traffic volume on bandwidth-constrained network paths by avoiding the transmission of repeated byte sequences. Previous...
Cristian Lumezanu, Katherine Guo, Neil Spring, Bob...
FC
2010
Springer
171views Cryptology» more  FC 2010»
14 years 1 months ago
The Phish-Market Protocol: Securely Sharing Attack Data between Competitors
A key way in which banks mitigate the effects of phishing is to remove fraudulent websites or suspend abusive domain names. This ‘take-down’ is often subcontracted to special...
Tal Moran, Tyler Moore
MM
2004
ACM
145views Multimedia» more  MM 2004»
14 years 2 months ago
Proportional service differentiation in wireless LANs using spacing-based channel occupancy regulation
In this paper, we propose Spacing-based Channel Occupancy Regulation (SCORE) MAC protocol that provides proportional service differentiation in terms of normalized throughput in w...
Qi Xue, Aura Ganz
GIS
2009
ACM
14 years 1 months ago
Machine learning approach to report prioritization with an application to travel time dissemination
This paper looks at the problem of data prioritization, commonly found in mobile ad-hoc networks. The proposed general solution uses a machine learning approach in order to learn ...
Piotr Szczurek, Bo Xu, Jie Lin, Ouri Wolfson