Sciweavers

3116 search results - page 153 / 624
» Recovering
Sort
View
NETWORKING
2004
13 years 10 months ago
Combining Source- and Localized Recovery to Achieve Reliable Multicast in Multi-hop Ad Hoc Networks
This paper proposes a novel reliable multicast transport protocol for multi-hop, wireless ad hoc networks (or MANETs). To recover from the different types of losses that may occur ...
Venkatesh Rajendran, Katia Obraczka, Yunjung Yi, S...
CRYPTO
2010
Springer
157views Cryptology» more  CRYPTO 2010»
13 years 10 months ago
Correcting Errors in RSA Private Keys
Abstract. Let pk = (N , e) be an RSA public key with corresponding secret key sk = (p, q, d, dp, dq , q-1 p ). Assume that we obtain partial error-free information of sk, e.g., ass...
Wilko Henecka, Alexander May, Alexander Meurer
ASE
2006
78views more  ASE 2006»
13 years 9 months ago
Using software evolution to focus architectural recovery
Ideally, a software project commences with requirements gathering and specification, reaches its major milestone with system implementation and delivery, and then continues, possi...
Nenad Medvidovic, Vladimir Jakobac
CORR
2007
Springer
86views Education» more  CORR 2007»
13 years 9 months ago
Variations on Information Embedding in Multiple Access and Broadcast Channels
Information embedding (IE) is the transmission of information within a host signal subject to a distortion constraint. There are two types of embedding methods, namely irreversibl...
Shivaprasad Kotagiri, J. Nicholas Laneman
SIAMJO
2010
246views more  SIAMJO 2010»
13 years 7 months ago
A Singular Value Thresholding Algorithm for Matrix Completion
This paper introduces a novel algorithm to approximate the matrix with minimum nuclear norm among all matrices obeying a set of convex constraints. This problem may be understood a...
Jian-Feng Cai, Emmanuel J. Candès, Zuowei S...