Sciweavers

2484 search results - page 355 / 497
» Polymatroids with Network Coding
Sort
View
SP
2009
IEEE
155views Security Privacy» more  SP 2009»
14 years 2 months ago
A Logic of Secure Systems and its Application to Trusted Computing
We present a logic for reasoning about properties of secure systems. The logic is built around a concurrent programming language with constructs for modeling machines with shared ...
Anupam Datta, Jason Franklin, Deepak Garg, Dilsun ...
ANSS
2008
IEEE
14 years 2 months ago
SCAR - Scattering, Concealing and Recovering Data within a DHT
This paper describes a secure and reliable method for storing data in a distributed hash table (DHT) leveraging the inherent properties of the DHT to provide a secure storage subs...
Bryan N. Mills, Taieb Znati
GLOBECOM
2008
IEEE
14 years 2 months ago
Characterization of Relay Channels Using the Bhattacharyya Parameter
—Relay systems have large and complex parameter spaces, which makes it difficult to determine the parameter region where the system achieves a given performance criterion, such ...
Josephine P. K. Chu, Andrew W. Eckford, Raviraj S....
ICMCS
2008
IEEE
150views Multimedia» more  ICMCS 2008»
14 years 2 months ago
Scalable video adaptation optimization using soft decision scheme
Video transmission over a heterogeneous network suffers a condition that it has required to satisfy many different constraints because of the variety limitations of client equipme...
Chia-Ho Pan, Sheng-Chieh Huang, I-Hsien Lee, Chung...
PIMRC
2008
IEEE
14 years 2 months ago
Decoding-based channel estimation for selective cooperation diversity protocols
— We describe and analyze Minimum Path Difference (MPD), a metric to improve threshold-based Selection Decodeand-Forward (SDF) protocols in cooperative wireless networks with cha...
Stefan Valentin, Tobias Volkhausen, Furuzan Atay O...