Sciweavers

4004 search results - page 74 / 801
» How Many Packets Can We Encode
Sort
View
PERCOM
2010
ACM
15 years 28 days ago
Security analysis of reliable transport layer protocols for wireless sensor networks
End-to-end reliability of communications is an important requirement in many applications of wireless sensor networks. For this reason, a number of reliable transport protocols sp...
Levente Buttyán, L. Csik
125
Voted
VTC
2007
IEEE
105views Communications» more  VTC 2007»
15 years 8 months ago
Experimental Analysis of Broadcast Reliability in Dense Vehicular Networks
Abstract—Dedicated Short Range Communications (DSRC)based communications enable novel automotive safety applications such as an Extended Electronic Brake Light or Intersection Co...
Kishore Ramachandran, Marco Gruteser, Ryokichi Oni...
ICIAR
2004
Springer
15 years 8 months ago
Lossless Compression of Color-Quantized Images Using Block-Based Palette Reordering
Abstract. It is well-known that the lossless compression of color-indexed images can be improved if a suitable reordering of the palette is performed before encoding the images. In...
António J. R. Neves, Armando J. Pinho
116
Voted
ACSAC
2006
IEEE
15 years 8 months ago
How to Automatically and Accurately Sandbox Microsoft IIS
Comparing the system call sequence of a network application against a sandboxing policy is a popular approach to detecting control-hijacking attack, in which the attacker exploits...
Wei Li, Lap-Chung Lam, Tzi-cker Chiueh
WWW
2007
ACM
16 years 3 months ago
Promotion of Ontological Comprehension: Exposing Terms and Metadata with Web 2.0
Knowledge artifacts that have been labeled as ontologies have many different qualities and intended outcomes. This is particularly true of bio-ontologies where high demand has led...
Andrew Gibson, Katy Wolstencroft, Robert Stevens