Sciweavers

2421 search results - page 116 / 485
» Message from the Editor-in-Chief
Sort
View
CORR
2007
Springer
113views Education» more  CORR 2007»
13 years 10 months ago
Network Coding over a Noisy Relay : a Belief Propagation Approach
Abstract— In recent years, network coding has been investigated as a method to obtain improvements in wireless networks. A typical assumption of previous work is that relay nodes...
Sichao Yang, Ralf Koetter
IJNSEC
2007
161views more  IJNSEC 2007»
13 years 10 months ago
Data Hiding: Current Status and Key Issues
Image steganography is a covert communication method that uses an image as the cover to hide the truth from potential attackers that some secret message hidden in the image is bei...
Nan-I Wu, Min-Shiang Hwang
CORR
2010
Springer
151views Education» more  CORR 2010»
13 years 9 months ago
Adding a referee to an interconnection network: What can(not) be computed in one round
Abstract—In this paper we ask which properties of a distributed network can be computed from a few amount of local information provided by its nodes. The distributed model we con...
Florent Becker, Martín Matamala, Nicolas Ni...
INFOCOM
2010
IEEE
13 years 8 months ago
Retiring Replicants: Congestion Control for Intermittently-Connected Networks
Abstract—The widespread availability of mobile wireless devices offers growing opportunities for the formation of temporary networks with only intermittent connectivity. These in...
Nathanael Thompson, Samuel C. Nelson, Mehedi Bakht...
RULEML
2010
Springer
13 years 8 months ago
Photorealistic Semantic Web Service Groundings: Unifying RESTful and XML-RPC Groundings Using Rules, with an Application to Flic
Semantic Web services achieve effects in the world through Web services, so the mechanism connecting the ontological representations of services with the on-the-wire messages—th...
Dave Lambert, John Domingue