Sciweavers

143 search results - page 4 / 29
» Language-Based Information Erasure
Sort
View
GLOBECOM
2010
IEEE
13 years 5 months ago
Diversity Embedded Streaming Erasure Codes (DE-SCo): Constructions and Optimality
Streaming erasure codes encode a source stream to guarantee that each source packet is recovered within a fixed delay at the receiver over a burst-erasure channel. This paper intro...
Ahmed Badr, Ashish Khisti, Emin Martinian
CANS
2009
Springer
126views Cryptology» more  CANS 2009»
14 years 2 months ago
Ensuring Authentication of Digital Information Using Cryptographic Accumulators
In this paper, we study the broadcast authentication problem for both erasure and adversarial networks. Two important concerns for authentication protocols are the authentication ...
Christophe Tartary
WDAG
2005
Springer
88views Algorithms» more  WDAG 2005»
14 years 28 days ago
Optimal Resilience for Erasure-Coded Byzantine Distributed Storage
We analyze the problem of efficient distributed storage of information in a message-passing environment where both less than one third of the servers, as well as an arbitrary num...
Christian Cachin, Stefano Tessaro
INFOCOM
2008
IEEE
14 years 1 months ago
On the Throughput Capacity of Opportunistic Multicasting with Erasure Codes
— In this paper, we concentrate on opportunistic scheduling for multicast information. We pose the problem as a multicast throughput optimization problem. As a solution we presen...
Ulas C. Kozat
CAISE
2003
Springer
14 years 20 days ago
A Scenario Description Language Based on Action Frame
Scenarios that describe concrete behaviors of system play an important role in system development and in particular requirements engineering. Scenarios are informal, and are diffic...
Hong Hui Zhang, Atsushi Ohnishi