Sciweavers

CORR
2010
Springer
77views Education» more  CORR 2010»
13 years 8 months ago
A Proximity based Retransmission Scheme for Power Line Ad-hoc LAN
Power line as an alternative for data transmission is being explored, and also being used to a certain extent. But from the data transfer point of view, power line, as a channel i...
Chitta Ranjan Singha
CORR
2008
Springer
137views Education» more  CORR 2008»
13 years 8 months ago
Counteracting Byzantine Adversaries with Network Coding: An Overhead Analysis
Network coding increases throughput and is robust against failures and erasures. However, since it allows mixing of information within the network, a single corrupted packet genera...
MinJi Kim, Muriel Médard, João Barro...
CORR
2010
Springer
126views Education» more  CORR 2010»
13 years 8 months ago
Visibility maintenance via controlled invariance for leader-follower Dubins-like vehicles
The paper studies the visibility maintenance problem (VMP) for a leader-follower pair of robots modelled as first-order dynamic systems and proposes an original solution based on t...
Fabio Morbidi, Francesco Bullo, Domenico Prattichi...
CORR
2008
Springer
146views Education» more  CORR 2008»
13 years 8 months ago
Intrusion Detection Using Cost-Sensitive Classification
Intrusion Detection is an invaluable part of computer networks defense. An important consideration is the fact that raising false alarms carries a significantly lower cost than not...
Aikaterini Mitrokotsa, Christos Dimitrakakis, Chri...
CORR
2008
Springer
91views Education» more  CORR 2008»
13 years 8 months ago
An Algebraic Approach for the MIMO Control of Small Scale Helicopter
The control of small-scale helicopter is a MIMO problem. To use of classical control approach to formally solve a MIMO problem, one needs to come up with multidimensional Root Loc...
Agus Budiyono, T. Sudiyanto
CORR
2010
Springer
165views Education» more  CORR 2010»
13 years 8 months ago
Performance Analysis of a 60 GHz Near Gigabit System for WPAN Applications
A 60 GHz wireless Gigabit Ethernet (G.E.) communication system capable of near gigabit data rate has been developed at IETR. The realized system covers 2 GHz available bandwidth. T...
Lahatra Rakotondrainibe, Yvan Kokar, Gheorghe Zaha...
CORR
2008
Springer
74views Education» more  CORR 2008»
13 years 8 months ago
Understanding individual human mobility patterns
M. C. Gonzalez, Cesar A. Hidalgo R., Albert-L&aacu...
CORR
2010
Springer
68views Education» more  CORR 2010»
13 years 8 months ago
A framework to experiment optimizations for real-time and embedded software
Hugues Cassé, Karine Heydemann, Haluk Ozakt...
CORR
2008
Springer
129views Education» more  CORR 2008»
13 years 8 months ago
Bounds on Codes Based on Graph Theory
"THIS PAPER IS ELIGIBLE FOR THE STUDENT PAPER AWARD" Let Aq(n, d) be the maximum order (maximum number of codewords) of a q-ary code of length n and Hamming distance at l...
Salim Y. El Rouayheb, Costas N. Georghiades, Emina...
CORR
2008
Springer
172views Education» more  CORR 2008»
13 years 8 months ago
Altruism in Congestion Games
This paper studies the effects of introducing altruistic agents into atomic congestion games. Altruistic behavior is modeled by a trade-off between selfish and social objectives. ...
Martin Hoefer, Alexander Skopalik