Sciweavers

9284 search results - page 1803 / 1857
» Knowledge State Algorithms
Sort
View
INFOCOM
2008
IEEE
15 years 8 months ago
Select-and-Protest-Based Beaconless Georouting with Guaranteed Delivery in Wireless Sensor Networks
—Recently proposed beaconless georouting algorithms are fully reactive, with nodes forwarding packets without prior knowledge of their neighbors. However, existing approaches for...
Hanna Kalosha, Amiya Nayak, Stefan Rührup, Iv...
94
Voted
INFOCOM
2008
IEEE
15 years 8 months ago
An Explanation for Unexpected 802.11 Outdoor Link-level Measurement Results
—This paper provides experimental evidence that “weird”/poor outdoor link-level performance measurements may be caused by driver/card-specific antenna diversity algorithms u...
Domenico Giustiniano, Giuseppe Bianchi, Luca Scali...
133
Voted
NDSS
2008
IEEE
15 years 8 months ago
Automated Whitebox Fuzz Testing
Fuzz testing is an effective technique for finding security vulnerabilities in software. Traditionally, fuzz testing tools apply random mutations to well-formed inputs of a progr...
Patrice Godefroid, Michael Y. Levin, David A. Moln...
ICASSP
2007
IEEE
15 years 8 months ago
Evolutionary Sequence Modeling for Discovery of Peptide Hormones
There are currently a large number of ‘‘orphan’’ G-protein-coupled receptors (GPCRs) whose endogenous ligands (peptide hormones) are unknown. Identification of these pepti...
M. Kemal Sönmez, Lawrence Toll, Nina Zaveri
132
Voted
ICC
2007
IEEE
109views Communications» more  ICC 2007»
15 years 8 months ago
Design Linear Multiuser Transmitters from Linear Multiuser Receivers
— Novel concepts are introduced for finding the relationship between multiuser detection (MUD) and multiuser transmission (MUT), so that the study in MUT can benefit from the w...
Lie-Liang Yang
« Prev « First page 1803 / 1857 Last » Next »