Sciweavers

2265 search results - page 103 / 453
» Recovering Exchanged Data
Sort
View
MM
2004
ACM
109views Multimedia» more  MM 2004»
14 years 3 months ago
Loss-resilient on-demand media streaming using priority encoding
A novel solution to the reliable multicast problem is the “digital fountain” approach, in which data is encoded with an erasure protection code before transmission, and receiv...
Cheng Huang, Ramaprabhu Janakiraman, Lihao Xu
SIGMOD
2003
ACM
104views Database» more  SIGMOD 2003»
14 years 10 months ago
XML schema
The United States Environmental Protection Agency (EPA) prepares a national criteria and hazardous air pollutant (HAP) emission inventory with input from numerous states, local an...
Charles E. Campbell, Andrew Eisenberg, Jim Melton
VTC
2010
IEEE
145views Communications» more  VTC 2010»
13 years 8 months ago
Distributed Convolutional-Coded Differential Space-Time Block Coding
— A low complexity distributed coding scheme is proposed for communications over Rayleigh fading channels. Convolutional Coding (CC) assisted Differential Phase-Shift Keying (DPS...
Soon Xin Ng, Yang Wang, Lajos Hanzo
ACNS
2011
Springer
241views Cryptology» more  ACNS 2011»
13 years 1 months ago
Misuse Detection in Consent-Based Networks
Consent-based networking, which requires senders to have permission to send traffic, can protect against multiple attacks on the network. Highly dynamic networks like Mobile Ad-hoc...
Mansoor Alicherry, Angelos D. Keromytis
SDM
2010
SIAM
153views Data Mining» more  SDM 2010»
13 years 11 months ago
Reconstruction from Randomized Graph via Low Rank Approximation
The privacy concerns associated with data analysis over social networks have spurred recent research on privacypreserving social network analysis, particularly on privacypreservin...
Leting Wu, Xiaowei Ying, Xintao Wu