Sciweavers

224 search results - page 11 / 45
» Secure Computation from Random Error Correcting Codes
Sort
View
127
Voted
ICALP
2000
Springer
15 years 6 months ago
Scalable Secure Storage when Half the System Is Faulty
In this paper, we provide a method to safely store a document in perhaps the most challenging settings, a highly decentralized replicated storage system where up to half of the st...
Noga Alon, Haim Kaplan, Michael Krivelevich, Dahli...
143
Voted
CORR
2010
Springer
105views Education» more  CORR 2010»
14 years 9 months ago
Universal and Robust Distributed Network Codes
Random linear network codes can be designed and implemented in a distributed manner, with low computational complexity. However, these codes are classically implemented [1] over fi...
Tracey Ho, Sidharth Jaggi, Svitlana Vyetrenko, Lin...
118
Voted
PERCOM
2007
ACM
16 years 2 months ago
Energy-Efficient Data Dissemination for Wireless Sensor Networks
In order to disseminate a large amount of data through a sensor network, it is common to split the data into smallsized chunk packets. If the data is additionally encoded by a for...
Marcel Busse, Thomas Haenselmann, Wolfgang Effelsb...
122
Voted
ACL
2010
15 years 25 days ago
Conditional Random Fields for Word Hyphenation
Finding allowable places in words to insert hyphens is an important practical problem. The algorithm that is used most often nowadays has remained essentially unchanged for 25 yea...
Nikolaos Trogkanis, Charles Elkan
134
Voted
OOPSLA
2004
Springer
15 years 8 months ago
Finding and preventing run-time error handling mistakes
It is difficult to write programs that behave correctly in the presence of run-time errors. Existing programming language features often provide poor support for executing clean-u...
Westley Weimer, George C. Necula