Sciweavers

122 search results - page 16 / 25
» On Contamination in Information Ecosystems
Sort
View
INFOCOM
2007
IEEE
15 years 3 months ago
Resilient Network Coding in the Presence of Byzantine Adversaries
Abstract— Network coding substantially increases network throughput. But since it involves mixing of information inside the network, a single corrupted packet generated by a mali...
Sidharth Jaggi, Michael Langberg, Sachin Katti, Tr...
69
Voted
INAP
2001
Springer
15 years 1 months ago
Defeasible Logic
We often reach conclusions partially on the basis that we do not have evidence that the conclusion is false. A newspaper story warning that the local water supply has been contamin...
Donald Nute
TWC
2008
136views more  TWC 2008»
14 years 9 months ago
On Antijamming in General CDMA Systems-Part II: Antijamming Performance of Coded Multicarrier Frequency-Hopping Spread Spectrum
In the first part of the paper, the capacity of a general multiuser code division multiple access (CDMA) jamming channel was analyzed for noncooperative and cooperative users in up...
Reza Nikjah, Norman C. Beaulieu
APWEB
2011
Springer
14 years 1 months ago
SecGuard: Secure and Practical Integrity Protection Model for Operating Systems
Host compromise is a serious security problem for operating systems. Most previous solutions based on integrity protection models are difficult to use; on the other hand, usable i...
Ennan Zhai, Qingni Shen, Yonggang Wang, Tao Yang, ...
ICEIS
2008
IEEE
15 years 4 months ago
Service Engineering for the Internet of Services
Abstract. The Internet and the Web have extended traditional business networks by allowing a Web of different digital resources to work together to create value for organizations. ...
Jorge Cardoso, Konrad Voigt, Matthias Winkler