Sciweavers

2655 search results - page 37 / 531
» LT Network Codes
Sort
View
DM
2006
86views more  DM 2006»
13 years 9 months ago
Decomposing oriented graphs into transitive tournaments
For an oriented graph G with n vertices, let f(G) denote the minimum number of transitive subtournaments that decompose G. We prove several results on f(G). In particular, if G is...
Raphael Yuster
VTC
2006
IEEE
118views Communications» more  VTC 2006»
14 years 3 months ago
NASC: Network-Aware Source Coding for Wireless Broadcast Channels with Multiple Sources
In this paper, we present a network-aware source coding (NASC) approach for wireless broadcast channels with multiple sources. The proposed NSAC approach takes into account the in...
Fulu Li
DIMVA
2011
13 years 19 days ago
Code Pointer Masking: Hardening Applications against Code Injection Attacks
In this paper we present an efficient countermeasure against code injection attacks. Our countermeasure does not rely on secret values such as stack canaries and protects against a...
Pieter Philippaerts, Yves Younan, Stijn Muylle, Fr...
SMARTNET
2000
13 years 10 months ago
Internet Service Delivery Control with Mobile Code
The trend towards value-added Internet services causes network providers to deploy new network based quality-of-service and security services. Today, however, the customer has onl...
Manuel Günter, Torsten Braun
EWSN
2009
Springer
14 years 3 months ago
DHV: A Code Consistency Maintenance Protocol for Multi-hop Wireless Sensor Networks
Ensuring that every sensor node has the same code version is challenging in dynamic, unreliable multi-hop sensor networks. When nodes have different code versions, the network may...
Thanh Dang, Nirupama Bulusu, Wu-chi Feng, Seungweo...