Sciweavers

2065 search results - page 101 / 413
» P systems applications to systems biology
Sort
View
EUROITV
2007
Springer
14 years 5 months ago
Psychological Backgrounds for Inducing Cooperation in Peer-to-Peer Television
Television and the Internet have proven to be a popular combination for both broadcasters and viewers. Because of this popularity they are increasingly facing the consequences of c...
Jenneke Fokker, Huib de Ridder, Piet Westendorp, J...
P2P
2008
IEEE
14 years 5 months ago
Playing with the Bandwidth Conservation Law
We investigate performance bounds of P2P systems by application of the law of bandwidth conservation. This approach is quite general and allows us to consider various sharing syst...
Farid Benbadis, Fabien Mathieu, Nidhi Hegde, Diego...
IJNSEC
2010
324views more  IJNSEC 2010»
13 years 6 months ago
Computing the Modular Inverse of a Polynomial Function over GF(2P) Using Bit Wise Operation
Most public key crypto systems use finite field modulo arithmetic. This modulo arithmetic is applied on real numbers, binary values and polynomial functions. The computation cost ...
Rajaram Ramasamy, Amutha Prabakar Muniyandi
ICASSP
2011
IEEE
13 years 2 months ago
SEAMLESS P2P-MDVC with well-balanced descriptions
Multiple-description coding (MDC) provides a promising solution to support the error-prone transmission over multiple channels. One extremely important application is to design ef...
Shuyuan Zhu, Jeff Siu-Kei Au-Yeung, Bing Zeng
TPDS
2008
116views more  TPDS 2008»
13 years 11 months ago
Pseudo Trust: Zero-Knowledge Authentication in Anonymous P2Ps
Most trust models in Peer-to-Peer (P2P) systems are identity based, which means that in order for one peer to trust another, it needs to know the other peer's identity. Hence,...
Li Lu, Jinsong Han, Yunhao Liu, Lei Hu, Jinpeng Hu...