Sciweavers

554 search results - page 22 / 111
» A New Approach For Source Authentication Of Multicast Data
Sort
View
CIKM
2008
Springer
13 years 9 months ago
Social navigation and annotation for electronic books
Modern efforts on digitizing electronic books focus on preserving authentic "spatial" representation of the original sources. The new format requires new tools to help u...
Jae-Kyung Kim, Rosta Farzan, Peter Brusilovsky
CISS
2008
IEEE
14 years 2 months ago
A linear integer programming approach to analyze P2P media streaming
Recent advancement in peer-to-peer (P2P) technologies has enabled a wide range of new applications. In this paper, we present mixed integer programming (MIP) formulations to analy...
Fulu Li, Jianwei Huang, Andrew Lippman
CORR
2010
Springer
180views Education» more  CORR 2010»
13 years 7 months ago
A Network Coding Approach to Loss Tomography
Network tomography aims at inferring internal network characteristics based on measurements at the edge of the network. In loss tomography, in particular, the characteristic of in...
Athina Markopoulou, Christina Fragouli, Minas Gjok...
IJNSEC
2008
160views more  IJNSEC 2008»
13 years 7 months ago
Authenticated Reliable and Semi-reliable Communication in Wireless Sensor Networks
Secure communication in wireless ad hoc sensor networks is a major research concern in the networking community. Especially the few available resources in terms of processing powe...
Falko Dressler
FDBS
2001
108views more  FDBS 2001»
13 years 9 months ago
Combining a Formal with an Example-driven Approach for Data Integration
Integrating data sources is a general problem in many scenarios. The main problem is the heterogeneity between data sources which were created and developed separately. In the lit...
Ingolf Geist, Kai-Uwe Sattler, Ingo Schmitt