Sciweavers

18204 search results - page 3443 / 3641
» Distributed Video Presentations
Sort
View
INFOCOM
2009
IEEE
15 years 10 months ago
Null Keys: Limiting Malicious Attacks Via Null Space Properties of Network Coding
—The performance of randomized network coding can suffer significantly when malicious nodes corrupt the content of the exchanged blocks. Previous work have introduced error corr...
Elias Kehdi, Baochun Li
INFOCOM
2009
IEEE
15 years 10 months ago
FS2You: Peer-Assisted Semi-Persistent Online Storage at a Large Scale
—It has been widely acknowledged that online storage systems within the “cloud” of the Internet provide services of a substantial value to end users who wish to share files ...
Ye Sun, Fangming Liu, Bo Li, Baochun Li, Xinyan Zh...
INFOCOM
2009
IEEE
15 years 10 months ago
Budget-Based Self-Optimized Incentive Search in Unstructured P2P Networks
—Distributed object search is the primary function of Peer-to-Peer (P2P) file sharing system to locate and transfer the file. The predominant search schemes in unstructured P2P...
Yi Hu, Min Feng, Laxmi N. Bhuyan, Vana Kalogeraki
131
Voted
INFOCOM
2009
IEEE
15 years 10 months ago
Time Valid One-Time Signature for Time-Critical Multicast Data Authentication
Abstract—It is challenging to provide authentication to timecritical multicast data, where low end-to-end delay is of crucial importance. Consequently, it requires not only effi...
Qiyan Wang, Himanshu Khurana, Ying Huang, Klara Na...
INFOCOM
2009
IEEE
15 years 10 months ago
Barrier Coverage of Line-Based Deployed Wireless Sensor Networks
— Barrier coverage of wireless sensor networks has been studied intensively in recent years under the assumption that sensors are deployed uniformly at random in a large area (Po...
Anwar Saipulla, Cédric Westphal, Benyuan Li...
« Prev « First page 3443 / 3641 Last » Next »