Sciweavers

437 search results - page 77 / 88
» Randomized Lattice Decoding
Sort
View
DBISP2P
2005
Springer
131views Database» more  DBISP2P 2005»
15 years 4 months ago
Symmetric Replication for Structured Peer-to-Peer Systems
Structured peer-to-peer systems rely on replication as a basic means to provide fault-tolerance in presence of high churn. Most select replicas using either multiple hash functions...
Ali Ghodsi, Luc Onana Alima, Seif Haridi
IPSN
2005
Springer
15 years 4 months ago
Sensing capacity for discrete sensor network applications
We bound the number of sensors required to achieve a desired level of sensing accuracy in a discrete sensor network application (e.g. distributed detection). We model the state of...
Yaron Rachlin, Rohit Negi, Pradeep K. Khosla
EUROCRYPT
2004
Springer
15 years 4 months ago
Public-Key Steganography
Informally, a public-key steganography protocol allows two parties, who have never met or exchanged a secret, to send hidden messages over a public channel so that an adversary can...
Luis von Ahn, Nicholas J. Hopper
MM
2000
ACM
166views Multimedia» more  MM 2000»
15 years 3 months ago
A video-based rendering acceleration algorithm for interactive walkthroughs
We present a new approach for faster rendering of large synthetic environments using video-based representations. We decompose the large environment into cells and pre-compute vid...
Andrew Wilson, Ming C. Lin, Boon-Lock Yeo, Minerva...
CORR
2008
Springer
98views Education» more  CORR 2008»
14 years 11 months ago
High-SNR Analysis of Outage-Limited Communications with Bursty and Delay-Limited Information
Abstract-- This work analyzes the high-SNR asymptotic error performance of outage-limited communications with fading, where the number of bits that arrive at the transmitter during...
Somsak Kittipiyakul, Petros Elia, Tara Javidi