Sciweavers

377 search results - page 52 / 76
» Constrained Codes as Networks of Relations
Sort
View
NSDI
2007
13 years 10 months ago
Ensuring Content Integrity for Untrusted Peer-to-Peer Content Distribution Networks
Many existing peer-to-peer content distribution networks (CDNs) such as Na Kika, CoralCDN, and CoDeeN are deployed on PlanetLab, a relatively trusted environment. But scaling them...
Nikolaos Michalakis, Robert Soulé, Robert G...
CANS
2008
Springer
118views Cryptology» more  CANS 2008»
13 years 9 months ago
Workload Characterization of a Lightweight SSL Implementation Resistant to Side-Channel Attacks
Abstract. Ever-growing mobility and ubiquitous wireless Internet access raise the need for secure communication with devices that may be severely constrained in terms of processing...
Manuel Koschuch, Johann Großschädl, Udo...
ICIP
2003
IEEE
14 years 9 months ago
Distributed image compression for sensor networks using correspondence analysis and super-resolution
We outline a distributed codingtechnique for images captured from sensors with overlapping fields of view in a sensor network. First, images from correlated views are roughly regi...
R. Wagner, Robert D. Nowak, Richard G. Baraniuk
TWC
2008
127views more  TWC 2008»
13 years 7 months ago
Energy-Delay Analysis of MAC Protocols in Wireless Networks
In this paper the tradeoff between energy and delay for wireless networks is studied. A network using a request-to-send (RTS) and clear-to-send (CTS) type medium access control (M...
Shih Yu Chang, Wayne E. Stark, Achilleas Anastasop...
JSAC
2010
105views more  JSAC 2010»
13 years 2 months ago
Multi-Cell MIMO Cooperative Networks: A New Look at Interference
This paper presents an overview of the theory and currently known techniques for multi-cell MIMO (multiple input multiple output) cooperation in wireless networks. In dense network...
David Gesbert, Stephen V. Hanly, Howard Huang, Shl...