Sciweavers

986 search results - page 159 / 198
» Protecting the Intranet Against
Sort
View
IOR
2010
93views more  IOR 2010»
13 years 6 months ago
Equilibrium Capacity Expansion Under Stochastic Demand Growth
In critical energy infrastructure sectors (e.g. electric power generation, natural gas transportation, oil refining capacity) maintaining certain level of excess capacity is soci...
Alfredo Garcia, Zhijiang Shen
VTC
2010
IEEE
171views Communications» more  VTC 2010»
13 years 6 months ago
Optimum Physical-Layer Frame Size for Maximising the Application-Layer Rateless Code's Effective Throughput
— The tolerable packet-loss ratio of an Internet Protocol (IP) based wireless networks varies according to the specific services considered. File transfer for example must be er...
Tim Stevens, Robert G. Maunder, Lajos Hanzo
VTC
2010
IEEE
172views Communications» more  VTC 2010»
13 years 6 months ago
Turbo Source Compression with Jointly Optimized Inner Irregular and Outer Irregular Codes
—In this paper, we present a near-lossless compression scheme for scalar-quantized source codec parameters based on iterative source-channel decoding (ISCD). The scheme is compar...
Laurent Schmalen, Peter Vary, Thorsten Clevorn, Ma...
ACSAC
2010
IEEE
13 years 6 months ago
A multi-user steganographic file system on untrusted shared storage
Existing steganographic file systems enable a user to hide the existence of his secret data by claiming that they are (static) dummy data created during disk initialization. Such ...
Jin Han, Meng Pan, Debin Gao, HweeHwa Pang
FMICS
2010
Springer
13 years 6 months ago
A Study of Shared-Memory Mutual Exclusion Protocols Using CADP
Mutual exclusion protocols are an essential building block of concurrent systems: indeed, such a protocol is required whenever a shared resource has to be protected against concurr...
Radu Mateescu, Wendelin Serwe