Sciweavers

554 search results - page 11 / 111
» A New Approach For Source Authentication Of Multicast Data
Sort
View
ICASSP
2009
IEEE
14 years 2 months ago
TDOA estimation for cyclostationary sources: New correlations-based bounds and estimators
We consider the problem of Time Difference of Arrival (TDOA) estimation for cyclostationary signals in additive white Gaussian noise. Classical approaches to the problem either ig...
Moshe Teplitsky, Arie Yeredor
ICALP
2005
Springer
14 years 1 months ago
Computational Bounds on Hierarchical Data Processing with Applications to Information Security
Motivated by the study of algorithmic problems in the domain of information security, in this paper, we study the complexity of a new class of computations over a collection of va...
Roberto Tamassia, Nikos Triandopoulos
TIT
2008
106views more  TIT 2008»
13 years 7 months ago
Byzantine Modification Detection in Multicast Networks With Random Network Coding
This paper gives an information theoretic approach for detecting Byzantine modifications in networks employing random linear network coding. Each exogenous source packet is augmen...
Tracey Ho, Ben Leong, Ralf Koetter, Muriel M&eacut...
ICDE
2005
IEEE
95views Database» more  ICDE 2005»
14 years 9 months ago
SemCast: Semantic Multicast for Content-based Data Dissemination
We address the problem of content-based dissemination of highly-distributed, high-volume data streams for stream-based monitoring applications and large-scale data delivery. Exist...
Olga Papaemmanouil, Ugur Çetintemel
SIGCOMM
1998
ACM
13 years 11 months ago
A Digital Fountain Approach to Reliable Distribution of Bulk Data
—The proliferation of applications that must reliably distribute bulk data to a large number of autonomous clients motivates the design of new multicast and broadcast protocols. ...
John W. Byers, Michael Luby, Michael Mitzenmacher,...