—Secret sharing and erasure coding-based approaches have been used in distributed storage systems to ensure the confidentiality, integrity, and availability of critical informati...
Manghui Tu, Peng Li, I-Ling Yen, Bhavani M. Thurai...
Endosymbiotic Computing entails attaching an RF-enabled microcontroller module (endomodule) to an appliance such that it appears as a networked device in the cyber world. It enabl...
This paper investigates the perceptual quality of decoded video bitstreams after packet losses. We focus on lowresolution and low-bit rate video coded by the H.264/AVC encoder, an...
Tao Liu, Yao Wang, Jill M. Boyce, Zhenyu Wu, Hua Y...
—Dirty paper code (DPC) can be used in a number of communication network applications; broadcast channels, multiuser interference channels and ISI channels to name a few. We stud...
Automatic-repeat request (ARQ) protocols are used to provide reliable communication in wireless networks. In this paper the throughput of the basic selective-repeat (SR) ARQ in bl...