Sciweavers

2545 search results - page 365 / 509
» ARQ for Network Coding
Sort
View
104
Voted
TLDI
2009
ACM
142views Formal Methods» more  TLDI 2009»
15 years 10 months ago
Static extraction of sound hierarchical runtime object graphs
For many object-oriented systems, it is often useful to have a runtime architecture that shows networks of communicating objects. But it is hard to statically extract runtime obje...
Marwan Abi-Antoun, Jonathan Aldrich
123
Voted
SP
2009
IEEE
155views Security Privacy» more  SP 2009»
15 years 8 months ago
A Logic of Secure Systems and its Application to Trusted Computing
We present a logic for reasoning about properties of secure systems. The logic is built around a concurrent programming language with constructs for modeling machines with shared ...
Anupam Datta, Jason Franklin, Deepak Garg, Dilsun ...
140
Voted
ANSS
2008
IEEE
15 years 8 months ago
SCAR - Scattering, Concealing and Recovering Data within a DHT
This paper describes a secure and reliable method for storing data in a distributed hash table (DHT) leveraging the inherent properties of the DHT to provide a secure storage subs...
Bryan N. Mills, Taieb Znati
GLOBECOM
2008
IEEE
15 years 8 months ago
Characterization of Relay Channels Using the Bhattacharyya Parameter
—Relay systems have large and complex parameter spaces, which makes it difficult to determine the parameter region where the system achieves a given performance criterion, such ...
Josephine P. K. Chu, Andrew W. Eckford, Raviraj S....
129
Voted
ICMCS
2008
IEEE
150views Multimedia» more  ICMCS 2008»
15 years 8 months ago
Scalable video adaptation optimization using soft decision scheme
Video transmission over a heterogeneous network suffers a condition that it has required to satisfy many different constraints because of the variety limitations of client equipme...
Chia-Ho Pan, Sheng-Chieh Huang, I-Hsien Lee, Chung...