Sciweavers

688 search results - page 78 / 138
» Network Coding Protocols for Secret Key Distribution
Sort
View
PERCOM
2011
ACM
14 years 8 months ago
P3-coupon: A probabilistic system for Prompt and Privacy-preserving electronic coupon distribution
—In this paper, we propose P3 -coupon, a Prompt and Privacy-preserving electronic coupon distribution system based on a Probabilistic one-ownership forwarding algorithm. In this ...
Boying Zhang, Jin Teng, Xiaole Bai, Zhimin Yang, D...
CODASPY
2012
14 years 11 days ago
Identifying native applications with high assurance
Main stream operating system kernels lack a strong and reliable mechanism for identifying the running processes and binding them to the corresponding executable applications. In t...
Hussain M. J. Almohri, Danfeng (Daphne) Yao, Denni...
ICIP
2003
IEEE
16 years 6 months ago
Distributed image compression for sensor networks using correspondence analysis and super-resolution
We outline a distributed codingtechnique for images captured from sensors with overlapping fields of view in a sensor network. First, images from correlated views are roughly regi...
R. Wagner, Robert D. Nowak, Richard G. Baraniuk
INFOCOM
2002
IEEE
15 years 9 months ago
Efficient Distributed Path Selection for Shared Restoration Connections
—In MPLS/GMPLS networks, a range of restoration schemes will be required to support different tradeoffs between service interruption time and network resource utilization. In lig...
Guangzhi Li, Dongmei Wang, Charles R. Kalmanek, Ro...
JNCA
2000
117views more  JNCA 2000»
15 years 4 months ago
Distributed network storage service with quality-of-service guarantees
This paper envisions a distributed network storage service with Quality-ofService (QoS) guarantees, and describes its architecture and key mechanisms. When fully realized, this se...
John Chung-I Chuang, Marvin A. Sirbu