Sciweavers

828 search results - page 128 / 166
» A Network Coding Approach to Secret Key Distribution
Sort
View
141
Voted
NOSSDAV
2010
Springer
15 years 6 months ago
Mesh-based peer-to-peer layered video streaming with taxation
Recent advance in scalable video coding (SVC) makes it possible for users to receive the same video with different qualities. To adopt SVC in P2P streaming, two key design questio...
Hao Hu, Yang Guo, Yong Liu
141
Voted
MOBISYS
2010
ACM
15 years 4 months ago
PRISM: platform for remote sensing using smartphones
To realize the potential of opportunistic and participatory sensing using mobile smartphones, a key challenge is ensuring the ease of developing and deploying such applications, w...
Tathagata Das, Prashanth Mohan, Venkata N. Padmana...
NC
2007
129views Neural Networks» more  NC 2007»
15 years 2 months ago
Sorting of neural spikes: When wavelet based methods outperform principal component analysis
Sorting of the extracellularly recorded spikes is a basic prerequisite for analysis of the cooperative neural behavior and neural code. Fundamentally the sorting performance is deï...
Alexey N. Pavlov, Valeri A. Makarov, Ioulia Makaro...
144
Voted
IPSN
2004
Springer
15 years 8 months ago
Backcasting: adaptive sampling for sensor networks
Wireless sensor networks provide an attractive approach to spatially monitoring environments. Wireless technology makes these systems relatively flexible, but also places heavy d...
Rebecca Willett, Aline Martin, Robert Nowak
SP
2008
IEEE
285views Security Privacy» more  SP 2008»
15 years 9 months ago
SybilLimit: A Near-Optimal Social Network Defense against Sybil Attacks
Decentralized distributed systems such as peer-to-peer systems are particularly vulnerable to sybil attacks, where a malicious user pretends to have multiple identities (called sy...
Haifeng Yu, Phillip B. Gibbons, Michael Kaminsky, ...