Results 1 - 10
of
3,731
Design of capacity-approaching irregular low-density parity-check codes
- IEEE TRANS. INFORM. THEORY
, 2001
"... We design low-density parity-check (LDPC) codes that perform at rates extremely close to the Shannon capacity. The codes are built from highly irregular bipartite graphs with carefully chosen degree patterns on both sides. Our theoretical analysis of the codes is based on [1]. Assuming that the unde ..."
Abstract
-
Cited by 588 (6 self)
- Add to MetaCart
We design low-density parity-check (LDPC) codes that perform at rates extremely close to the Shannon capacity. The codes are built from highly irregular bipartite graphs with carefully chosen degree patterns on both sides. Our theoretical analysis of the codes is based on [1]. Assuming
Tinysec: A link layer security architecture for wireless sensor networks
- in Proc of the 2nd Int’l Conf on Embedded Networked Sensor Systems
"... We introduce TinySec, the first fully-implemented link layer security architecture for wireless sensor networks. In our design, we leverage recent lessons learned from design vulnerabilities in security protocols for other wireless networks such as 802.11b and GSM. Conventional security protocols te ..."
Abstract
-
Cited by 521 (0 self)
- Add to MetaCart
tend to be conservative in their security guarantees, typically adding 16–32 bytes of overhead. With small memories, weak processors, limited energy, and 30 byte packets, sensor networks cannot afford this luxury. TinySec addresses these extreme resource constraints with careful design; we explore
Eliminating receive livelock in an interrupt-driven kernel
- ACM Transactions on Computer Systems
, 1997
"... Most operating systems use interface interrupts to schedule network tasks. Interrupt-driven systems can provide low overhead and good latency at low of-fered load, but degrade significantly at higher arrival rates unless care is taken to prevent several pathologies. These are various forms of receiv ..."
Abstract
-
Cited by 322 (5 self)
- Add to MetaCart
Most operating systems use interface interrupts to schedule network tasks. Interrupt-driven systems can provide low overhead and good latency at low of-fered load, but degrade significantly at higher arrival rates unless care is taken to prevent several pathologies. These are various forms
An Experimental Evaluation Of The Assumption Of Independence In Multi-Version Programming
- IEEE TRANSACTIONS ON SOFTWARE ENGINEERING
, 1986
"... N-version programming has been proposed as a method of incorporating fault tolerance into software. Multiple versions of a program (i.e. "N") are prepared and executed in parallel. Their outputs are collected and examined by a voter,and, if they are not identical, it is assumed that the ma ..."
Abstract
-
Cited by 313 (13 self)
- Add to MetaCart
prepared independently from the same specification at twouniversities and then subjected to one million tests. The results of the tests revealed that the programs were individually extremely reliable but that the number of tests in which more than one program failed was substantially more than expected
Practical Loss-Resilient Codes
, 1997
"... We present a randomized construction of linear-time encodable and decodable codes that can transmit over lossy channels at rates extremely close to capacity. The encoding and decoding algorithms for these codes have fast and simple software implementations. Partial implementations of our algorithms ..."
Abstract
-
Cited by 284 (25 self)
- Add to MetaCart
requirement. Despite the simplicity of the algorithms, their design and analysis are mathematically intricate. The design requires the careful choice of a random irregular bipartite graph, where the structure of the irregular graph is extremely important. We model the progress of the decoding algorithm by a
CodeBlue: An ad hoc sensor network infrastructure for emergency medical care
- In International Workshop on Wearable and Implantable Body Sensor Networks
, 2004
"... Sensor devices integrating embedded processors, low-power, lowbandwidth radios, and a modest amount of storage have the potential to enhance emergency medical care. Wearable vital sign sensors can track patient status and location, while simultaneously operating as active tags. We introduce CodeBlue ..."
Abstract
-
Cited by 222 (6 self)
- Add to MetaCart
Sensor devices integrating embedded processors, low-power, lowbandwidth radios, and a modest amount of storage have the potential to enhance emergency medical care. Wearable vital sign sensors can track patient status and location, while simultaneously operating as active tags. We introduce Code
Do Networks Really Work? A Framework for Evaluating Public-Sector Organizational Networks.
- Public Administration Review,
, 2001
"... Although cooperative, interorganizational networks have become a common mechanism for delivery of public services, evaluating their effectiveness is extremely complex and has generally been neglected. To help resolve this problem, we discuss the evaluation of networks of community-based, mostly pub ..."
Abstract
-
Cited by 167 (3 self)
- Add to MetaCart
Although cooperative, interorganizational networks have become a common mechanism for delivery of public services, evaluating their effectiveness is extremely complex and has generally been neglected. To help resolve this problem, we discuss the evaluation of networks of community-based, mostly
Mixed logit models: state of practice
- Transportation
, 2003
"... The mixed logit model is considered to be the most promising state of the art discrete choice model currently available. Increasingly researchers and practitioners are estimating mixed logit models of various degrees of sophistication with mixtures of revealed preference and stated choice data. It i ..."
Abstract
-
Cited by 158 (16 self)
- Add to MetaCart
. It is timely to review progress in model estimation since the learning curve is steep and the unwary are likely to fall into a chasm if not careful. These chasms are very deep indeed given the complexity of the mixed logit model. Although the theory is relatively clear, estimation and data issues are far from
Fusing Points and Lines for High Performance Tracking
- IN INTERNATIONAL CONFERENCE ON COMPUTER VISION
, 2005
"... This paper addresses the problem of real-time 3D modelbased tracking by combining point-based and edge-based tracking systems. We present a careful analysis of the properties of these two sensor systems and show that this leads to some non-trivial design choices that collectively yield extremely hig ..."
Abstract
-
Cited by 151 (5 self)
- Add to MetaCart
This paper addresses the problem of real-time 3D modelbased tracking by combining point-based and edge-based tracking systems. We present a careful analysis of the properties of these two sensor systems and show that this leads to some non-trivial design choices that collectively yield extremely
Extreme Networks
, 2004
"... There is growing interest in deploying Voice over IP services, particularly within single enterprise environments. While applications such as le transfer or common web access do not need quality of service mechanisms in most environments, popular voice encoding algorithms might need support from Qua ..."
Abstract
- Add to MetaCart
Quality of Service (QoS) mechanisms in some network environments. When a network deployment has been carefully engineered and is over-provisioned throughout, then no network congestion is possible and quality of service mechanisms will not be needed. However, over-provisioning of bandwidth is less common
Results 1 - 10
of
3,731