Sciweavers

224 search results - page 36 / 45
» Secure Computation from Random Error Correcting Codes
Sort
View
CORR
2006
Springer
110views Education» more  CORR 2006»
13 years 7 months ago
Reliable Multi-Path Routing Schemes for Real-Time Streaming
In off-line streaming, packet level erasure resilient Forward Error Correction (FEC) codes rely on the unrestricted buffering time at the receiver. In real-time streaming, the ext...
Emin Gabrielyan, Roger D. Hersch
IPPS
2006
IEEE
14 years 1 months ago
Analysis of checksum-based execution schemes for pipelined processors
The performance requirements for contemporary microprocessors are increasing as rapidly as their number of applications grows. By accelerating the clock, performance can be gained...
Bernhard Fechner
ICC
2007
IEEE
153views Communications» more  ICC 2007»
14 years 1 months ago
Mapping for Iterative MMSE-SIC with Belief Propagation
Abstract— In Multiple-Input Multiple-Output (MIMO) wireless systems, since different signals are transmitted by different antennas simultaneously, interference occurs between the...
Satoshi Gounai, Tomoaki Ohtsuki
OPODIS
2010
13 years 5 months ago
Self-stabilizing (k, r)-Clustering in Wireless Ad-hoc Networks with Multiple Paths
Abstract. Wireless Ad-hoc networks are distributed systems that often reside in error-prone environments. Self-stabilization lets the system recover autonomously from an arbitrary ...
Andreas Larsson, Philippas Tsigas
CRYPTO
2000
Springer
133views Cryptology» more  CRYPTO 2000»
13 years 11 months ago
Sequential Traitor Tracing
Traceability schemes allow detection of at least one traitor when a group of colluders attempt to construct a pirate decoder and gain illegal access to digital content. Fiat and Ta...
Reihaneh Safavi-Naini, Yejing Wang