Sciweavers

256 search results - page 45 / 52
» Exchanging messages of different sizes
Sort
View
SUTC
2010
IEEE
14 years 10 days ago
Pushing the Throughput Limit of Low-Complexity Wireless Embedded Sensing Systems
—To maximize the communication throughput for wireless sensing systems, designers have attempted various combinations of protocol design and manual code optimization. Although th...
Vahid Salmani, Pai H. Chou
PAKDD
2000
ACM
128views Data Mining» more  PAKDD 2000»
14 years 1 days ago
A Comparative Study of Classification Based Personal E-mail Filtering
This paper addresses personal E-mail filtering by casting it in the framework of text classification. Modeled as semi-structured documents, Email messages consist of a set of field...
Yanlei Diao, Hongjun Lu, Dekai Wu
MASCOTS
2004
13 years 9 months ago
Analysis of Peer-to-Peer Systems: Workload Characterization and Effects on Traffic Cacheability
Peer-to-peer file sharing networks have emerged as a new popular application in the Internet scenario. In this paper, we provide an analytical model of the resources size and of t...
Mauro Andreolini, Riccardo Lancellotti, Philip S. ...
IJPP
2008
74views more  IJPP 2008»
13 years 8 months ago
Bandwidth Efficient All-to-All Broadcast on Switched Clusters
We develop an all-to-all broadcast scheme that achieves maximum bandwidth efficiency for clusters with tree topologies. Using our scheme for clusters with cut-through switches, an...
Ahmad Faraj, Pitch Patarasuk, Xin Yuan
JEI
2006
128views more  JEI 2006»
13 years 8 months ago
Performance study of common image steganography and steganalysis techniques
Abstract. We investigate the performance of state of the art universal steganalyzers proposed in the literature. These universal steganalyzers are tested against a number of well-k...
Mehdi Kharrazi, Husrev T. Sencar, Nasir D. Memon