Sciweavers

3570 search results - page 2 / 714
» A User Model for Information Erasure
Sort
View
INFOCOM
2008
IEEE
14 years 12 days ago
On the Throughput Capacity of Opportunistic Multicasting with Erasure Codes
— In this paper, we concentrate on opportunistic scheduling for multicast information. We pose the problem as a multicast throughput optimization problem. As a solution we presen...
Ulas C. Kozat
CANS
2009
Springer
126views Cryptology» more  CANS 2009»
14 years 18 days ago
Ensuring Authentication of Digital Information Using Cryptographic Accumulators
In this paper, we study the broadcast authentication problem for both erasure and adversarial networks. Two important concerns for authentication protocols are the authentication ...
Christophe Tartary
CORR
2007
Springer
146views Education» more  CORR 2007»
13 years 6 months ago
Coding for Errors and Erasures in Random Network Coding
Abstract—The problem of error-control in random linear network coding is considered. A “noncoherent” or “channel oblivious” model is assumed where neither transmitter nor...
Ralf Koetter, Frank R. Kschischang
GLOBE
2011
Springer
12 years 5 months ago
Hybrid Approaches for Distributed Storage Systems
Abstract. Distributed or peer-to-peer storage solutions rely on the introduction of redundant data to be fault-tolerant and to achieve high reliability. One way to introduce redund...
Júlio Araújo, Frédéric...
IEICET
2008
136views more  IEICET 2008»
13 years 6 months ago
Delay Analysis of Car-to-Car Reliable Data Delivery Strategies Based on Data Mulling with Network Coding
Abstract--Vehicular ad hoc networks (VANET) aims to enhance vehicle navigation safety by providing an early warning system: any chance of accidents is informed through the wireless...
Joon-Sang Park, Uichin Lee, Soon-Young Oh, Mario G...