Sciweavers

554 search results - page 8 / 111
» A New Approach For Source Authentication Of Multicast Data
Sort
View
INFOCOM
2000
IEEE
13 years 12 months ago
RMX: Reliable Multicast for Heterogeneous Networks
—Although IP Multicast is an effective network primitive for best-effort, large-scale, multi-point communication, many multicast applications such as shared whiteboards, multi-pl...
Yatin Chawathe, Steven McCanne, Eric A. Brewer
DRM
2007
Springer
14 years 1 months ago
Randomized radon transforms for biometric authentication via fingerprint hashing
We present a new technique for generating biometric fingerprint hashes, or summaries of information contained in human fingerprints. Our method calculates and aggregates various...
Mariusz H. Jakubowski, Ramarathnam Venkatesan
TELSYS
2002
128views more  TELSYS 2002»
13 years 7 months ago
An Evaluation of Shared Multicast Trees with Multiple Cores
Native multicast routing protocols have been built and deployed using two basic types of trees: singlesource, shortest-path trees and shared, core-based trees. Core-based multicas...
Daniel Zappala, Aaron Fabbri, Virginia Mary Lo
ADVIS
2004
Springer
13 years 11 months ago
On Families of New Adaptive Compression Algorithms Suitable for Time-Varying Source Data
In this paper, we introduce a new approach to adaptive coding which utilizes Stochastic Learning-based Weak Estimation (SLWE) techniques to adaptively update the probabilities of t...
Luís G. Rueda, B. John Oommen
EVOW
2009
Springer
14 years 2 months ago
Swarm Intelligence Inspired Multicast Routing: An Ant Colony Optimization Approach
Abstract. The advancement of network induces great demands on a series of applications such as the multicast routing. This paper firstly makes a brief review on the algorithms in ...
Xiaomin Hu, Jun Zhang, Li-Ming Zhang