Sciweavers

2655 search results - page 189 / 531
» LT Network Codes
Sort
View
108
Voted
WCNC
2008
IEEE
15 years 7 months ago
Iterative Detection of Three-Stage Concatenated FFH-MFSK
Abstract— Serially concatenated and iteratively decoded Irregular Variable Length Coding (IrVLC) combined with precoded Fast Frequency Hopping (FFH) M-ary Frequency Shift Keying ...
Sohail Ahmed, Robert G. Maunder, Lie-Liang Yang, L...
116
Voted
PKC
1999
Springer
86views Cryptology» more  PKC 1999»
15 years 5 months ago
Preserving Privacy in Distributed Delegation with Fast Certificates
Abstract. In a distributed system, dynamically dividing execution between nodes is essential for service robustness. However, when all of the nodes cannot be equally trusted, and w...
Pekka Nikander, Yki Kortesniemi, Jonna Partanen
120
Voted
VCIP
2000
134views Communications» more  VCIP 2000»
15 years 2 months ago
High-level syntax for H.26L: first results
This paper introduces some preliminary results of the standardization process of ITU-T's H.26L project. This forthcoming video coding standard will not only significantly imp...
Stephan Wenger
DCC
2008
IEEE
16 years 10 days ago
Asymmetric Multi-level Diversity Coding
Symmetric multilevel diversity coding was introduced by Roche et al, where a set of K information sources is encoded by K encoders and the decoders reconstruct sources 1, . . . , ...
Soheil Mohajer, Chao Tian, Suhas N. Diggavi
ACSAC
2007
IEEE
15 years 7 months ago
Spector: Automatically Analyzing Shell Code
Detecting the presence of buffer overflow attacks in network messages has been a major focus. Only knowing whether a message contains an attack, however, is not always enough to m...
Kevin Borders, Atul Prakash, Mark Zielinski