Sciweavers

11 search results - page 2 / 3
» Insight into redundancy schemes in DHTs
Sort
View
NDSS
2008
IEEE
13 years 11 months ago
Halo: High-Assurance Locate for Distributed Hash Tables
We study the problem of reliably searching for resources in untrusted peer-to-peer networks, where a significant portion of the participating network nodes may act maliciously to...
Apu Kapadia, Nikos Triandopoulos
CORR
2006
Springer
147views Education» more  CORR 2006»
13 years 4 months ago
ARQ Diversity in Fading Random Access Channels
A cross-layer optimization approach is adopted for the design of symmetric random access wireless systems. Instead of the traditional collision model, a more realistic physical la...
Young-Han Nam, Praveen Kumar Gopala, Hesham El Gam...
FAST
2010
13 years 7 months ago
Understanding Latent Sector Errors and How to Protect Against Them
Latent sector errors (LSEs) refer to the situation where particular sectors on a drive become inaccessible. LSEs are a critical factor in data reliability, since a single LSE can ...
Bianca Schroeder, Sotirios Damouras, Phillipa Gill
INFOCOM
2007
IEEE
13 years 11 months ago
Analysis of A Loss-Resilient Proactive Data Transmission Protocol in Wireless Sensor Networks
Abstract— Many of sensor network applications require reliable data communication such that data packets can be delivered to the destination without loss. However, existing relia...
Yingqi Xu, Wang-Chien Lee, Jianliang Xu
ACNS
2010
Springer
172views Cryptology» more  ACNS 2010»
13 years 8 months ago
Secure Sketch for Multiple Secrets
Secure sketches are useful in extending cryptographic schemes to biometric data since they allow recovery of fuzzy secrets under inevitable noise. In practice, secrets derived from...
Chengfang Fang, Qiming Li, Ee-Chien Chang