Sciweavers

224 search results - page 24 / 45
» Secure Computation from Random Error Correcting Codes
Sort
View
EMSOFT
2006
Springer
13 years 11 months ago
Reliability mechanisms for file systems using non-volatile memory as a metadata store
Portable systems such as cell phones and portable media players commonly use non-volatile RAM (NVRAM) to hold all of their data and metadata, and larger systems can store metadata...
Kevin M. Greenan, Ethan L. Miller
ICDCS
2011
IEEE
12 years 7 months ago
JR-SND: Jamming-Resilient Secure Neighbor Discovery in Mobile Ad Hoc Networks
Abstract—Secure neighbor discovery is fundamental to mobile ad hoc networks (MANETs) deployed in hostile environments and refers to the process in which two neighboring nodes exc...
Rui Zhang 0007, Yanchao Zhang, Xiaoxia Huang
IPPS
2008
IEEE
14 years 1 months ago
Improving software reliability and productivity via mining program source code
A software system interacts with third-party libraries through various APIs. Insufficient documentation and constant refactorings of third-party libraries make API library reuse ...
Tao Xie, Mithun Acharya, Suresh Thummalapenta, Kun...
ICCV
2007
IEEE
14 years 1 months ago
A Multi-Image Restoration Method for Image Reconstruction from Projections
in Proc. IEEE Int’l Conf. on Computer Vision (ICCV), October, 2007 Traditional Bayesian restoration methods depend heavily on the accuracy of underlying generative models. For t...
Yunqiang Chen, Lin Cheng, Tong Fang, Rainer Raupac...
JCM
2008
70views more  JCM 2008»
13 years 7 months ago
Reed-Solomon Codes for Low Power Communications
Power consumption is a critical issue for many applications running on autonomous battery operated devices. In the context of low power communications, the use of Forward Error Cor...
Lionel Biard, Dominique Noguet