Sciweavers

17951 search results - page 37 / 3591
» Network Coding Applications
Sort
View
DSOM
1999
Springer
14 years 23 days ago
Derivation of Backup Service Management Applications from Service and System Models
The backup of large data sets is preferably performed automatically outside of regular working hours. In highly structured computer networks, however, faults and exceptions may rel...
Ingo Lück, Marcus Schönbach, Arnulf Mest...
WWW
2008
ACM
14 years 9 months ago
Protecting web services from remote exploit code: a static analysis approach
We propose STILL, a signature-free remote exploit binary code injection attack blocker to protect web servers and web applications. STILL is robust to almost all anti-signature, a...
Xinran Wang, Yoon-chan Jhi, Sencun Zhu, Peng Liu
CORR
2007
Springer
158views Education» more  CORR 2007»
13 years 8 months ago
Multi-group ML Decodable Collocated and Distributed Space Time Block Codes
Abstract— In this paper, collocated and distributed spacetime block codes (DSTBCs) which admit multi-group maximum likelihood (ML) decoding are studied. First the collocated case...
G. Susinder Rajan, B. Sundar Rajan
IEEECIT
2006
IEEE
14 years 2 months ago
A Novel Implementation of JPEG 2000 Lossless Coding Based on LZMA
Faced with drawbacks of JPEG 2000 lossless coding in network application as far as manipulation flexibility is concerned, this paper proposes a differential approach of implementa...
Zongjie Tu, Shiyong Zhang
IPPS
2010
IEEE
13 years 6 months ago
BitTorrent and fountain codes: friends or foes?
Abstract--BitTorrent is the most popular file sharing protocol on the Internet. It is proved that its performance are nearoptimal for generic file distribution when the overlay is ...
Salvatore Spoto, Rossano Gaeta, Marco Grangetto, M...