Sciweavers

CORR
2010
Springer
77views Education» more  CORR 2010»
13 years 10 months ago
A Proximity based Retransmission Scheme for Power Line Ad-hoc LAN
Power line as an alternative for data transmission is being explored, and also being used to a certain extent. But from the data transfer point of view, power line, as a channel i...
Chitta Ranjan Singha
CORR
2008
Springer
137views Education» more  CORR 2008»
13 years 10 months ago
Counteracting Byzantine Adversaries with Network Coding: An Overhead Analysis
Network coding increases throughput and is robust against failures and erasures. However, since it allows mixing of information within the network, a single corrupted packet genera...
MinJi Kim, Muriel Médard, João Barro...
CORR
2010
Springer
126views Education» more  CORR 2010»
13 years 10 months ago
Visibility maintenance via controlled invariance for leader-follower Dubins-like vehicles
The paper studies the visibility maintenance problem (VMP) for a leader-follower pair of robots modelled as first-order dynamic systems and proposes an original solution based on t...
Fabio Morbidi, Francesco Bullo, Domenico Prattichi...
CORR
2008
Springer
146views Education» more  CORR 2008»
13 years 10 months ago
Intrusion Detection Using Cost-Sensitive Classification
Intrusion Detection is an invaluable part of computer networks defense. An important consideration is the fact that raising false alarms carries a significantly lower cost than not...
Aikaterini Mitrokotsa, Christos Dimitrakakis, Chri...
CORR
2008
Springer
91views Education» more  CORR 2008»
13 years 10 months ago
An Algebraic Approach for the MIMO Control of Small Scale Helicopter
The control of small-scale helicopter is a MIMO problem. To use of classical control approach to formally solve a MIMO problem, one needs to come up with multidimensional Root Loc...
Agus Budiyono, T. Sudiyanto
CORR
2010
Springer
165views Education» more  CORR 2010»
13 years 10 months ago
Performance Analysis of a 60 GHz Near Gigabit System for WPAN Applications
A 60 GHz wireless Gigabit Ethernet (G.E.) communication system capable of near gigabit data rate has been developed at IETR. The realized system covers 2 GHz available bandwidth. T...
Lahatra Rakotondrainibe, Yvan Kokar, Gheorghe Zaha...
CORR
2008
Springer
74views Education» more  CORR 2008»
13 years 10 months ago
Understanding individual human mobility patterns
M. C. Gonzalez, Cesar A. Hidalgo R., Albert-L&aacu...
CORR
2010
Springer
68views Education» more  CORR 2010»
13 years 10 months ago
A framework to experiment optimizations for real-time and embedded software
Hugues Cassé, Karine Heydemann, Haluk Ozakt...
CORR
2008
Springer
129views Education» more  CORR 2008»
13 years 10 months ago
Bounds on Codes Based on Graph Theory
"THIS PAPER IS ELIGIBLE FOR THE STUDENT PAPER AWARD" Let Aq(n, d) be the maximum order (maximum number of codewords) of a q-ary code of length n and Hamming distance at l...
Salim Y. El Rouayheb, Costas N. Georghiades, Emina...
CORR
2008
Springer
172views Education» more  CORR 2008»
13 years 10 months ago
Altruism in Congestion Games
This paper studies the effects of introducing altruistic agents into atomic congestion games. Altruistic behavior is modeled by a trade-off between selfish and social objectives. ...
Martin Hoefer, Alexander Skopalik