Sciweavers

2655 search results - page 144 / 531
» LT Network Codes
Sort
View
EUROCRYPT
2010
Springer
15 years 5 months ago
Adaptively Secure Broadcast
A broadcast protocol allows a sender to distribute a message through a point-to-point network to a set of parties, such that (i) all parties receive the same message, even if the s...
Martin Hirt, Vassilis Zikas
125
Voted
CCS
2008
ACM
15 years 2 months ago
Authenticated hash tables
Hash tables are fundamental data structures that optimally answer membership queries. Suppose a client stores n elements in a hash table that is outsourced at a remote server so t...
Charalampos Papamanthou, Roberto Tamassia, Nikos T...
85
Voted
BMCBI
2006
78views more  BMCBI 2006»
15 years 24 days ago
An evaluation of human protein-protein interaction data in the public domain
Background: Protein-protein interaction (PPI) databases have become a major resource for investigating biological networks and pathways in cells. A number of publicly available re...
Suresh Mathivanan, Balamurugan Periaswamy, T. K. B...
102
Voted
ICIP
2005
IEEE
16 years 2 months ago
The role of the virtual channel in distributed source coding of video
In distributed video source coding side-information at the decoder is generated as a temporal prediction based on previous frames. This creates a virtual dependency channel betwee...
Ronald P. Westerlaken, Rene Klein Gunnewiek, Inald...
ICC
2007
IEEE
104views Communications» more  ICC 2007»
15 years 7 months ago
Time-and-Frequency-Hopping Optical Orthogonal Codes with Hierarchical Cross-Correlation Constraints for Service Differentiation
— In this paper, we consider time-and-frequency hopping (TFH) codes for optical code-division multiple-access (OCDMA) networks. To support the differentiated service requirements...
Chung-Keun Lee, Seung-Woo Seo