Sciweavers

2068 search results - page 255 / 414
» On Effectiveness of Application-Layer Coding
Sort
View
CLEIEJ
2006
126views more  CLEIEJ 2006»
15 years 5 months ago
Software Based Fault Tolerance against Byzantine Failures
The proposed software technique is a very low cost and an effective solution towards designing Byzantine fault tolerant computing application systems that are not so safety critic...
Goutam Kumar Saha
CORR
2006
Springer
100views Education» more  CORR 2006»
15 years 5 months ago
Capacity of Cooperative Fusion in the Presence of Byzantine Sensors
Abstract-- The problem of cooperative fusion in the presence of both Byzantine sensors and misinformed sensors is considered. An information theoretic formulation is used to charac...
Oliver Kosut, Lang Tong
IJNSEC
2008
209views more  IJNSEC 2008»
15 years 5 months ago
Application-Specific Key Release Scheme from Biometrics
This paper outlines a novel biometric key release scheme to bind application-specific key from biometric data such that the key can be retrieved effectively by using DiscreteHashi...
Thian Song Ong, Andrew Teoh Beng Jin, David Chek L...
JACM
2006
112views more  JACM 2006»
15 years 5 months ago
Linear work suffix array construction
Suffix trees and suffix arrays are widely used and largely interchangeable index structures on strings and sequences. Practitioners prefer suffix arrays due to their simplicity an...
Juha Kärkkäinen, Peter Sanders, Stefan B...
ALIFE
2004
15 years 4 months ago
Evolution of Robustness in Digital Organisms
We study the evolution of robustness in digital organisms adapting to a high mutation rate. As genomes adjust to the harsh mutational environment, the mean effect of single mutatio...
Jeffrey A. Edlund, Christoph Adami