Sciweavers

501 search results - page 16 / 101
» Redundancy and Diversity in Security
Sort
View
MSS
2005
IEEE
136views Hardware» more  MSS 2005»
14 years 2 months ago
Trade-Offs in Protecting Storage: A Meta-Data Comparison of Cryptographic, Backup/Versioning, Immutable/Tamper-Proof, and Redund
Modern storage systems are responsible for increasing amounts of data and the value of the data itself is growing in importance. Several primary storage system solutions have emer...
Joseph Tucek, Paul Stanton, Elizabeth Haubert, Rag...
TDSC
2008
121views more  TDSC 2008»
13 years 9 months ago
Multipath Key Establishment for Wireless Sensor Networks Using Just-Enough Redundancy Transmission
In random key predistribution techniques for wireless sensor networks, a relatively small number of keys are randomly chosen from a large key pool and are loaded on the sensors pri...
Jing Deng, Yunghsiang S. Han
ICC
2009
IEEE
166views Communications» more  ICC 2009»
14 years 3 months ago
A Cross-Layer Perspective on Rateless Coding for Wireless Channels
Abstract—Rateless coding ensures reliability by providing everincreasing redundancy, traditionally at the packet level (i.e. the application layer) through erasure coding. This p...
Thomas A. Courtade, Richard D. Wesel
HOTOS
1997
IEEE
14 years 1 months ago
Building Diverse Computer Systems
Diversity is an important source of robustness in biological systems. Computers, by contrast, are notable for their lack of diversity. Although homogeneous systems have many advan...
Stephanie Forrest, Anil Somayaji, David H. Ackley
GLOBECOM
2006
IEEE
14 years 3 months ago
Link-Adaptive Distributed Coding for Multi-Source Cooperation
Abstract— Combining multi-source cooperation and linkadaptive regenerative techniques, we develop a novel protocol capable of achieving diversity up to the number of cooperating ...
Alfonso Cano, Tairan Wang, Alejandro Ribeiro, Geor...