Sciweavers

2601 search results - page 293 / 521
» Quantum Network Coding
Sort
View
RAID
2010
Springer
13 years 8 months ago
Inferring Protocol State Machine from Real-World Trace
Application-level protocol specifications are helpful for network security management, including intrusion detection, intrusion prevention and detecting malicious code. However, c...
Yipeng Wang, Zhibin Zhang, Li Guo
ICASSP
2009
IEEE
13 years 7 months ago
Enhanced error resilience of video communications for burst losses using an extended ROPE algorithm
Video communications over wireless networks suffers various patterns of losses, including burst losses that cause great degradation in video quality. In this paper, we propose an ...
Yiting Liao, Jerry D. Gibson
WINET
2010
224views more  WINET 2010»
13 years 8 months ago
Hierarchical geographic multicast routing for wireless sensor networks
Wireless sensor networks comprise typically dense deployments of large networks of small wireless capable sensor devices. In such networks, multicast is a fundamental routing servi...
Dimitrios Koutsonikolas, Saumitra M. Das, Y. Charl...
DDECS
2009
IEEE
171views Hardware» more  DDECS 2009»
14 years 4 months ago
Packet header analysis and field extraction for multigigabit networks
—Packet header analysis and extraction of header fields needs to be performed in all network devices. As network speed is increasing quickly, high speed packet header processing...
Petr Kobierský, Jan Korenek, Libor Polcak
SRDS
2008
IEEE
14 years 4 months ago
SeNDORComm: An Energy-Efficient Priority-Driven Communication Layer for Reliable Wireless Sensor Networks
In many reliable Wireless Sensor Network (WSN) applications, messages have different priorities depending on urgency or importance. For example, a message reporting the failure of...
Vinaitheerthan Sundaram, Saurabh Bagchi, Yung-Hsia...