Sciweavers

3116 search results - page 230 / 624
» Recovering
Sort
View
93
Voted
CONEXT
2007
ACM
15 years 4 months ago
ER: efficient retransmission scheme for wireless LANs
Wireless LANs (WLANs) have been deployed at a remarkable rate at university campuses, office buildings, airports, hotels, and malls. Providing efficient and reliable wireless comm...
Eric Rozner, Anand Padmanabha Iyer, Yogita Mehta, ...
94
Voted
CSIE
2009
IEEE
15 years 4 months ago
Accessing Password-Protected Resources without the Password
Sometimes it is desirable to access password-protected resources, but undesirable to disclose the password to the machine in use. In such situations, providing the password is a t...
Andreas Pashalidis
FSE
2007
Springer
142views Cryptology» more  FSE 2007»
15 years 4 months ago
A New Class of Weak Keys for Blowfish
The reflection attack is a recently discovered self similarity analysis which is usually mounted on ciphers with many fixed points. In this paper, we describe two reflection attack...
Orhun Kara, Cevat Manap
ICC
2007
IEEE
15 years 4 months ago
LPRE: Lost Speech Packet Recovery with Enhancement
In the internet telephony, loss of IP packets causes instantaneous discontinuities in the received speech. In this paper, we have focused on finding an error resilient method for t...
Hossein Ajorloo, Mohammad T. Manzuri Shalmani
100
Voted
GLOBECOM
2009
IEEE
15 years 4 months ago
Adding Integrity Verification Capabilities to the LDPC-Staircase Erasure Correction Codes
File distribution is becoming a key technology, in particular in large scale content broadcasting systems like DVBH/SH. They largely rely on Application Level FEC codes (ALFEC) in ...
Mathieu Cunche, Vincent Roca