Sciweavers

2484 search results - page 250 / 497
» Polymatroids with Network Coding
Sort
View
110
Voted
ICASSP
2010
IEEE
15 years 2 months ago
A practical forwarding scheme for wireless relay channels based on the quantization of log-likelihood ratios
This paper considers a wireless relay network with one source, one relay, and one destination. We propose a low-complexity quantize-and-forward (QF) scheme in which the relay calc...
Stefan Schwandter, Gerald Matz
CORR
2010
Springer
148views Education» more  CORR 2010»
15 years 2 months ago
Techniques for Enhanced Physical-Layer Security
Information-theoretic security--widely accepted as the strictest notion of security--relies on channel coding techniques that exploit the inherent randomness of propagation channel...
Pedro C. Pinto, João Barros, Moe Z. Win
SCN
2008
Springer
119views Communications» more  SCN 2008»
15 years 2 months ago
Integrating fingerprint with cryptosystem for internet-based live pay-TV system
In the last few years, live pay-TV system via internet has come to be established with the development of broadband network. To develop such a system, a mechanism for content prote...
Shuhui Hou, Tetsutaro Uehara, Takashi Satoh, Yoshi...
ISCAS
2006
IEEE
180views Hardware» more  ISCAS 2006»
15 years 8 months ago
JPWL - an extension of JPEG 2000 for wireless imaging
—In this paper, we present an overview of the JPWL standardization activity. JPWL is an extension of JPEG 2000 for the efficient transmission of JPEG 2000 images over an error-pr...
Frédéric Dufaux, Giuseppe Baruffa, F...
ACSAC
1999
IEEE
15 years 6 months ago
User Authentication and Authorization in the Java(tm) Platform
JavaTM security technology originally focused on creating a safe environment in which to run potentially untrusted code downloaded from the public network. With the latest release...
Charlie Lai, Li Gong, Larry Koved, Anthony J. Nada...