Sciweavers

2484 search results - page 219 / 497
» Polymatroids with Network Coding
Sort
View
GECCO
2004
Springer
116views Optimization» more  GECCO 2004»
14 years 4 months ago
A Comment on Opt-AiNET: An Immune Network Algorithm for Optimisation
Verifying the published results of algorithms is part of the usual research process. This helps to both validate the existing literature, but also quite often allows for new insigh...
Jon Timmis, Camilla Edmonds
IANDC
2008
128views more  IANDC 2008»
13 years 10 months ago
Rule-based static analysis of network protocol implementations
Today's software systems communicate over the Internet using standard protocols that have been heavily scrutinized, providing some assurance of resistance to malicious attack...
Octavian Udrea, Cristian Lumezanu, Jeffrey S. Fost...
CODES
2010
IEEE
13 years 8 months ago
A greedy buffer allocation algorithm for power-aware communication in body sensor networks
Monitoring human movements using wireless sensory devices promises to revolutionize the delivery of healthcare services. In spite of their potentials for many application domains,...
Hassan Ghasemzadeh, Roozbeh Jafari
KBSE
2008
IEEE
14 years 5 months ago
A Case Study on the Automatic Composition of Network Application Mashups
MaxMash is a tool that can compose select features of networked application and generate the source code for application mashups that can integrate those features. This paper pres...
Maxim Shevertalov, Spiros Mancoridis
IPPS
2007
IEEE
14 years 5 months ago
An Approach to Detect Executable Content for Anomaly Based Network Intrusion Detection
Since current internet threats contain not only malicious codes like Trojan or worms, but also spyware and adware which do not have explicit illegal content, it is necessary to hav...
Like Zhang, Gregory B. White