Sciweavers

3373 search results - page 309 / 675
» Linear transformations on codes
Sort
View
INFOCOM
2008
IEEE
15 years 11 months ago
On the Throughput Capacity of Opportunistic Multicasting with Erasure Codes
— In this paper, we concentrate on opportunistic scheduling for multicast information. We pose the problem as a multicast throughput optimization problem. As a solution we presen...
Ulas C. Kozat
ICC
2007
IEEE
15 years 10 months ago
Statistical Simulator for Block Coded Channels with Long Residual Interference
Abstract— In this paper, we present a simple statistical simulation technique for channels with long memory operating under coded data. The proposed technique employs a divideand...
Natasa Blitvic, Vladimir Stojanovic
PLDI
2000
ACM
15 years 8 months ago
Safety checking of machine code
We show how to determine statically whether it is safe for untrusted machine code to be loaded into a trusted host system. Our safety-checking technique operates directly on the u...
Zhichen Xu, Barton P. Miller, Thomas W. Reps
CORR
2010
Springer
88views Education» more  CORR 2010»
15 years 4 months ago
Network Codes Resilient to Jamming and Eavesdropping
Abstract--We consider the problem of communicating information over a network secretly and reliably in the presence of a hidden adversary who can eavesdrop and inject malicious err...
Hongyi Yao, Danilo Silva, Sidharth Jaggi, Michael ...
CORR
2007
Springer
121views Education» more  CORR 2007»
15 years 4 months ago
On the Minimum Number of Transmissions in Single-Hop Wireless Coding Networks
— The advent of network coding presents promising opportunities in many areas of communication and networking. It has been recently shown that network coding technique can signiï...
Salim Y. El Rouayheb, Mohammad Asad R. Chaudhry, A...