Sciweavers

283 search results - page 50 / 57
» Group Key Management in MANETs
Sort
View
IH
2009
Springer
15 years 4 months ago
Estimating the Minimal Length of Tardos Code
Abstract. This paper estimates the minimal length of a binary probabilistic traitor tracing code. We consider the code construction proposed by G. Tardos in 2003, with the symmetri...
Teddy Furon, Luis Pérez-Freire, Arnaud Guya...
NCA
2007
IEEE
15 years 3 months ago
GORDA: An Open Architecture for Database Replication
Although database replication has been a standard feature in database management systems for a long time, third party solutions have been enjoying an increasing popularity. These ...
Alfrânio Correia Jr., José Pereira, L...
HICSS
2006
IEEE
100views Biometrics» more  HICSS 2006»
15 years 3 months ago
The Impact of Social Types within Information Communities: Findings from Technical Newsgroups
We explored whether Fisher and Durrance’s [11] framework of information communities applies to online technical newsgroups and the impact of particular social types on informati...
Tammara Combs Turner, Karen E. Fisher
APSEC
2002
IEEE
15 years 2 months ago
Lessons Learned in Framework-Based Software Process Improvement
Software process improvement (SPI) has emerged as a critical area for organizations involved in software development. There is now considerable evidence that SPI can provide subst...
Pankaj Jalote
ICC
1997
IEEE
133views Communications» more  ICC 1997»
15 years 1 months ago
MESH: Distributed Error Recovery for Multimedia Streams in Wide-Area Multicast Networks
This paper addresses support for nzulti-party multimedia applications delivered across datagram wide-area networks such as the Internet. Our approach is to develop a novel retrans...
Matthew T. Lucas, Bert J. Dempsey, Alfred C. Weave...