Sciweavers

3735 search results - page 594 / 747
» Order compression schemes
Sort
View
INFOCOM
2009
IEEE
15 years 7 months ago
Effective Delay Control in Online Network Coding
—Motivated by streaming applications with stringent delay constraints, we consider the design of online network coding algorithms with timely delivery guarantees. Assuming that t...
João Barros, Rui A. Costa, Daniele Munarett...
108
Voted
IPPS
2009
IEEE
15 years 7 months ago
On the tradeoff between playback delay and buffer space in streaming
We consider the following basic question: a source node wishes to stream an ordered sequence of packets to a collection of receivers, which are distributed among a number of clust...
Alix L. H. Chow, Leana Golubchik, Samir Khuller, Y...
93
Voted
SCALESPACE
2009
Springer
15 years 7 months ago
Image Denoising Using TV-Stokes Equation with an Orientation-Matching Minimization
Abstract. In this paper, we propose an orientation-matching minimization for denoising digital images with an additive noise. Inspired by the two-step algorithm in the TV-Stokes de...
Xue-Cheng Tai, Sofia Borok, Jooyoung Hahn
IMC
2009
ACM
15 years 7 months ago
Geolocalization of proxied services and its application to fast-flux hidden servers
Fast-flux is a redirection technique used by cyber-criminals to hide the actual location of malicious servers. Its purpose is to evade identification and prevent or, at least de...
Claude Castelluccia, Mohamed Ali Kâafar, Per...
125
Voted
ANSS
2008
IEEE
15 years 7 months ago
SCAR - Scattering, Concealing and Recovering Data within a DHT
This paper describes a secure and reliable method for storing data in a distributed hash table (DHT) leveraging the inherent properties of the DHT to provide a secure storage subs...
Bryan N. Mills, Taieb Znati