Sciweavers

2655 search results - page 151 / 531
» LT Network Codes
Sort
View
DSN
2005
IEEE
14 years 4 months ago
Coverage and the Use of Cyclic Redundancy Codes in Ultra-Dependable Systems
A Cyclic Redundancy Code (CRC), when used properly, can be an effective and relatively inexpensive method to detect data corruption across communication channels. However, some sy...
Michael Paulitsch, Jennifer Morris, Brendan Hall, ...
ICC
2007
IEEE
14 years 5 months ago
Using Session-Keystroke Mutual Information to Detect Self-Propagating Malicious Codes
— In this paper, we propose an endpoint-based joint network-host anomaly detection technique to detect selfpropagating malicious codes. Our proposed technique is based on the obs...
Syed A. Khayam, Hayder Radha
TIP
2008
95views more  TIP 2008»
13 years 10 months ago
Optimization of Packetization Masks for Image Coding Based on an Objective Cost Function for Desired Packet Spreading
In image communication over lossy packet networks (e.g., cell phone communication) packet loss errors lead to damaged images. Damaged images can be repaired with passive error conc...
Joost Rombaut, Aleksandra Pizurica, Wilfried Phili...
LCN
2007
IEEE
14 years 5 months ago
Efficient MD Coding Core Selection to Reduce the Bandwidth Consumption
- Multiple distribution trees and multiple description (MD) coding are highly robust since they provide redundancy both in network paths and data. However, MD coded streaming inclu...
Sunoh Choi, Sang-Seon Byun, Chuck Yoo
AINA
2007
IEEE
14 years 2 months ago
Verifying Identifier-Authenticity in Ubiquitous Computing Environment
In ubiquitous computing environment, identification of objects and places in the real world is important, and 2-D printing code is useful to store identifiers of them. However, si...
Tetsuo Kamina, Toshinori Aoki, Yoshiteru Eto, Nobo...