Sciweavers

3488 search results - page 8 / 698
» On Feedback for Network Coding
Sort
View
TIT
2010
103views Education» more  TIT 2010»
14 years 8 months ago
Performance bounds for erasure, list and decision feedback schemes with linear block codes
A message independence property and some new performance upper bounds are derived in this work for erasure, list and decision-feedback schemes with linear block codes transmitted ...
Eran Hof, Igal Sason, Shlomo Shamai
CSFW
2000
IEEE
15 years 5 months ago
Confidentiality for Mobile Code: The Case of a Simple Payment Protocol
We propose an approach to support confidentiality for mobile implementations of security-sensitive protocols using Java/JVM. An applet which receives and passes on confidential in...
Mads Dam, Pablo Giambiagi
QSHINE
2005
IEEE
15 years 7 months ago
Adaptive Low-Complexity Erasure-Correcting Code-Based Protocols for QoS-Driven Mobile Multicast Services
—We propose an adaptive hybrid automatic repeat request–forward error correction (ARQ–FEC) erasure-correcting scheme for quality of service (QoS)-driven mobile multicast serv...
Qinghe Du, Xi Zhang
ISCAS
2002
IEEE
94views Hardware» more  ISCAS 2002»
15 years 6 months ago
Video transport over ad-hoc networks using multiple paths
Enabling video transport over ad-hoc networks is more challenging than over other wireless networks because a connection path in an ad-hoc network is highly error-prone and a path...
Shunan Lin, Yao Wang, Shiwen Mao, Shivendra S. Pan...
RECSYS
2009
ACM
15 years 8 months ago
FeedbackTrust: using feedback effects in trust-based recommendation systems
With the advent of online social networks, the trust-based approach to recommendation has emerged which exploits the trust network among users and makes recommendations based on t...
Samaneh Moghaddam, Mohsen Jamali, Martin Ester, Ja...