Sciweavers

2945 search results - page 232 / 589
» Noisy Network Coding
Sort
View
EUSAI
2004
Springer
15 years 9 months ago
Remote Code Execution on Ubiquitous Mobile Applications
Today, most mobile devices (e.g. PDAs) are in some way associated to a fixed personal computer or server. In general this relation is only taken into account for synchronization p...
João Nuno Silva, Paulo Ferreira
ESORICS
2000
Springer
15 years 7 months ago
Using Reflection as a Mechanism for Enforcing Security Policies in Mobile Code
Several authors have proposed using code modification as a technique for enforcing security policies such as resource limits, access controls, and network information flows. Howeve...
Ian Welch, Robert J. Stroud
117
Voted
CORR
2010
Springer
104views Education» more  CORR 2010»
15 years 4 months ago
Distributed Successive Approximation Coding using Broadcast Advantage: The Two-Encoder Case
Abstract-- Traditional distributed source coding rarely considers the possible link between separate encoders. However, the broadcast nature of wireless communication in sensor net...
Zichong Chen, Guillermo Barrenetxea, Martin Vetter...
146
Voted
ICIP
2006
IEEE
16 years 5 months ago
Optimal Unequal Error Protection with User Cooperation for Transmission of Embedded Source-Coded Images
This paper studies the transmission of images encoded using an embedded source encoder over a wireless network allowing user cooperation. A dynamic programming algorithm is applie...
Andres Kwasinski, K. J. Ray Liu
DCC
2008
IEEE
15 years 10 months ago
Shared Descriptions Fusion Coding for Storage and Selective Retrieval of Correlated Sources
Motivated by sensor networks, we consider the fusion storage of correlated sources in a database, such that any subset of them may be efficiently retrieved in the future. Only st...
Sharadh Ramaswamy, Kenneth Rose