Sciweavers

3483 search results - page 537 / 697
» Forward
Sort
View
120
Voted
ENTCS
2007
102views more  ENTCS 2007»
15 years 3 months ago
Selective Data Encryption in Outsourced Dynamic Environments
The amount of information held by organizations’ databases is increasing very quickly. A recently proposed solution to the problem of data management, which is becoming increasi...
Ernesto Damiani, Sabrina De Capitani di Vimercati,...
122
Voted
ENTCS
2007
143views more  ENTCS 2007»
15 years 3 months ago
Formal Fault Tree Analysis - Practical Experiences
Safety is an important requirement for many modern systems. To ensure safety of complex critical systems, well-known safety analysis methods have been formalized. This holds in pa...
Frank Ortmeier, Gerhard Schellhorn
131
Voted
JSAC
2006
97views more  JSAC 2006»
15 years 3 months ago
Distributed Turbo Coding With Soft Information Relaying in Multihop Relay Networks
It has been shown that distributed turbo coding (DTC) can approach the capacity of a wireless relay network. In the existing DTC schemes, it is usually assumed that error-free deco...
Yonghui Li, Branka Vucetic, Tan F. Wong, Mischa Do...
142
Voted
JSAC
2006
114views more  JSAC 2006»
15 years 3 months ago
SCAN: self-organized network-layer security in mobile ad hoc networks
Protecting the network layer from malicious attacks is an important yet challenging security issue in mobile ad hoc networks. In this paper we describe SCAN, a unified networklayer...
Hao Yang, J. Shu, Xiaoqiao Meng, Songwu Lu
128
Voted
MMS
2008
15 years 3 months ago
Robust source-channel coding for real-time multimedia
Abstract Multimedia applications operating in today's Internet have to employ some form of error resilience to cope with losses. For interactive applications with strict delay...
György Dán, Viktória Fodor, Gun...