Sciweavers

3488 search results - page 8 / 698
» On Feedback for Network Coding
Sort
View
TIT
2010
103views Education» more  TIT 2010»
14 years 10 months ago
Performance bounds for erasure, list and decision feedback schemes with linear block codes
A message independence property and some new performance upper bounds are derived in this work for erasure, list and decision-feedback schemes with linear block codes transmitted ...
Eran Hof, Igal Sason, Shlomo Shamai
119
Voted
CSFW
2000
IEEE
15 years 7 months ago
Confidentiality for Mobile Code: The Case of a Simple Payment Protocol
We propose an approach to support confidentiality for mobile implementations of security-sensitive protocols using Java/JVM. An applet which receives and passes on confidential in...
Mads Dam, Pablo Giambiagi
QSHINE
2005
IEEE
15 years 9 months ago
Adaptive Low-Complexity Erasure-Correcting Code-Based Protocols for QoS-Driven Mobile Multicast Services
—We propose an adaptive hybrid automatic repeat request–forward error correction (ARQ–FEC) erasure-correcting scheme for quality of service (QoS)-driven mobile multicast serv...
Qinghe Du, Xi Zhang
ISCAS
2002
IEEE
94views Hardware» more  ISCAS 2002»
15 years 8 months ago
Video transport over ad-hoc networks using multiple paths
Enabling video transport over ad-hoc networks is more challenging than over other wireless networks because a connection path in an ad-hoc network is highly error-prone and a path...
Shunan Lin, Yao Wang, Shiwen Mao, Shivendra S. Pan...
153
Voted
RECSYS
2009
ACM
15 years 10 months ago
FeedbackTrust: using feedback effects in trust-based recommendation systems
With the advent of online social networks, the trust-based approach to recommendation has emerged which exploits the trust network among users and makes recommendations based on t...
Samaneh Moghaddam, Mohsen Jamali, Martin Ester, Ja...