Sciweavers

1282 search results - page 165 / 257
» Practical Loss-Resilient Codes
Sort
View
ASWEC
2009
IEEE
14 years 4 months ago
Change Propagation Analysis Using Domain Information
We propose a novel methodology for analysing change propagation in software using the domain-level behavioural model of a system. We hypothesize that change propagation analysis i...
Amir Aryani, Ian D. Peake, Margaret Hamilton, Hein...
ISPEC
2009
Springer
14 years 4 months ago
Hash-Based Key Management Schemes for MPEG4-FGS
We propose two symmetric-key management schemes for the encryption of scalable compressed video content. The schemes are applicable to MPEG-4 Fine Grain Scalability video coding. O...
Mohamed Karroumi, Ayoub Massoudi
DATE
2008
IEEE
91views Hardware» more  DATE 2008»
14 years 4 months ago
Integrating RTL IPs into TLM Designs Through Automatic Transactor Generation
Transaction Level Modeling (TLM) is an emerging design practice for overcoming increasing design complexity. It aims at simplifying the design flow of embedded systems ning and v...
Nicola Bombieri, Nicola Deganello, Franco Fummi
FGCN
2008
IEEE
197views Communications» more  FGCN 2008»
14 years 4 months ago
Design and Implementation of Hybrid Broadcast Authentication Protocols in Wireless Sensor Networks
The proposed broadcast authentication protocols for wireless sensor networks can be divided into two categories: protocols based on digital signature and protocols based on improv...
Xin Zhao, Xiaodong Wang
INFOCOM
2008
IEEE
14 years 4 months ago
An Optimization Framework for Opportunistic Multipath Routing in Wireless Mesh Networks
—We consider wireless mesh networks, and exploit the inherent broadcast nature of wireless by making use of multipath routing. We present an optimization framework that enables u...
Bozidar Radunovic, Christos Gkantsidis, Peter B. K...