Sciweavers

117 search results - page 12 / 24
» Coding Theorems on the Threshold Scheme for a General Source
Sort
View
CORR
2008
Springer
118views Education» more  CORR 2008»
13 years 7 months ago
Security for Wiretap Networks via Rank-Metric Codes
The problem of securing a network coding communication system against a wiretapper adversary is considered. The network implements linear network coding to deliver n packets from s...
Danilo Silva, Frank R. Kschischang
JCDL
2006
ACM
161views Education» more  JCDL 2006»
14 years 1 months ago
Learning metadata from the evidence in an on-line citation matching scheme
Citation matching, or the automatic grouping of bibliographic references that refer to the same document, is a data management problem faced by automatic digital libraries for sci...
Isaac G. Councill, Huajing Li, Ziming Zhuang, Sand...
CORR
2007
Springer
133views Education» more  CORR 2007»
13 years 7 months ago
The price of ignorance: The impact of side-information on delay for lossless source-coding
Inspired by the context of compressing encrypted sources, this paper considers the general tradeoff between rate, end-to-end delay, and probability of error for lossless source co...
Cheng Chang, Anant Sahai
EUROCRYPT
2007
Springer
14 years 1 months ago
Secure Computation from Random Error Correcting Codes
Abstract. Secure computation consists of protocols for secure arithmetic: secret values are added and multiplied securely by networked processors. The striking feature of secure co...
Hao Chen, Ronald Cramer, Shafi Goldwasser, Robbert...
PIMRC
2010
IEEE
13 years 5 months ago
Efficient cooperative protocols for general outage-limited multihop wireless networks
Abstract-- Due to the limited energy supplies of nodes in wireless networks, achieving energy efficiency is crucial for extending the lifetime of these networks. Thus, we study eff...
Behrouz Maham, Walid Saad, Mérouane Debbah,...