Sciweavers

688 search results - page 62 / 138
» Network Coding Protocols for Secret Key Distribution
Sort
View
TDSC
2010
218views more  TDSC 2010»
15 years 3 months ago
Secure Data Objects Replication in Data Grid
—Secret sharing and erasure coding-based approaches have been used in distributed storage systems to ensure the confidentiality, integrity, and availability of critical informati...
Manghui Tu, Peng Li, I-Ling Yen, Bhavani M. Thurai...
ICDCSW
2009
IEEE
15 years 11 months ago
Performance Tradeoffs Among Percolation-Based Broadcast Protocols in Wireless Sensor Networks
Broadcast of information in wireless sensor networks is an important operation, e.g., for code updates, queries, membership information, etc. In this paper, we analyze and experim...
Vijay Raman, Indranil Gupta
CORR
2008
Springer
137views Education» more  CORR 2008»
15 years 4 months ago
Design and Implementation Aspects of a novel Java P2P Simulator with GUI
Peer-to-peer networks consist of thousands or millions of nodes that might join and leave arbitrarily. The evaluation of new protocols in real environments is many times practical...
Vassilios Chrissikopoulos, George Papaloukopoulos,...
INFOCOM
2008
IEEE
15 years 11 months ago
How Many Packets Can We Encode? - An Analysis of Practical Wireless Network Coding
— While the practical coding scheme [1] has been shown to be able to improve throughput of wireless networks, there still lacks fundamental understanding on how the coding scheme...
Jilin Le, John C. S. Lui, Dah-Ming Chiu
INFOCOM
2009
IEEE
15 years 11 months ago
Interference-Resilient Information Exchange
—This paper presents an efficient protocol to reliably exchange information in a single-hop radio network with unpredictable interference. The devices can access C communication...
Seth Gilbert, Rachid Guerraoui, Dariusz R. Kowalsk...