Sciweavers

448 search results - page 28 / 90
» k-anonymous message transmission
Sort
View
PCM
2001
Springer
130views Multimedia» more  PCM 2001»
15 years 2 months ago
Data Encryption Using MRF with an RSA Key
In a digital multimedia era, the security of multimedia over network transmission becomes a challenging issue. A strategy, combining cryptography with steganography, is investigat...
Chaur-Chin Chen
IPPS
1998
IEEE
15 years 2 months ago
Experimental Validation of Parallel Computation Models on the Intel Paragon
Experimental data validating some of the proposed parallel computation models on the Intel Paragon is presented. This architecture is characterized by a large bandwidth and a rela...
Ben H. H. Juurlink
ICC
2008
IEEE
151views Communications» more  ICC 2008»
15 years 4 months ago
Hop-by-Hop Local Flow Control over InterPlaNetary Networks Based on DTN Architecture
—Deep space communications are an important research line in scientific community. The possibility of performing the communication between earth and other planets is an excitant ...
Floriano De Rango, Mauro Tropea, Giovanni Battista...
GLOBECOM
2006
IEEE
15 years 4 months ago
Distributed Medium Access Control in Pulse-Based Time-Hopping UWB Wireless Networks
— This paper investigates distributed medium access control (MAC) to achieve rate guarantee in pulse-based timehopping ultra-wideband (UWB) wireless networks, where the inherent ...
Hai Jiang, Kuang-Hao Liu, Weihua Zhuang, Xuemin Sh...
PODC
2009
ACM
15 years 2 months ago
Brief announcement: locality-based aggregate computation in wireless sensor networks
We present DRR-gossip, an energy-efficient and robust aggregate computation algorithm in wireless sensor networks. We prove that the DRR-gossip algorithm requires O(n) messages a...
Jen-Yeu Chen, Gopal Pandurangan, Jianghai Hu