Sciweavers

368 search results - page 31 / 74
» The Information Lost in Erasures
Sort
View
SP
2002
IEEE
140views Security Privacy» more  SP 2002»
13 years 8 months ago
Efficient Multicast Packet Authentication Using Signature Amortization
We describe a novel method for authenticating multicast packets that is robust against packet loss. Our main focus is to minimize the size of the communication overhead required t...
Jung Min Park, Edwin K. P. Chong, Howard Jay Siege...
CN
2011
140views more  CN 2011»
13 years 6 days ago
Towards the design of optimal data redundancy schemes for heterogeneous cloud storage infrastructures
Nowadays, data storage requirements from end-users are growing, demanding more capacity, more reliability and the capability to access information from anywhere. Cloud storage ser...
Lluis Pamies-Juarez, Pedro García Ló...
ICIP
2003
IEEE
14 years 10 months ago
Spline-based boundary loss concealment
Object-based video coding requires the transmission of the object shape. This shape is sent as a binary a-plane. In lossy packetbased networks, such as the Internet, this informat...
Guido M. Schuster, Xiaohuan Li, Aggelos K. Katsagg...
ICC
2007
IEEE
139views Communications» more  ICC 2007»
14 years 3 months ago
Constant Storage Self-Healing Key Distribution with Revocation in Wireless Sensor Network
— A self-healing key distribution scheme enables a large group of users (sensor nodes) to establish a session key dynamically over an unreliable, or lossy wireless network. The m...
Ratna Dutta, Yong Dong Wu, Sourav Mukhopadhyay
ICIP
2003
IEEE
14 years 10 months ago
PDE-based denoising of complex scenes using a spatially-varying fidelity term
The widely used denoising algorithms based on nonlinear diffusion, such as Perona-Malik and total variation denoising, modify images toward piecewise constant functions. Though ed...
Guy Gilboa, Yehoshua Y. Zeevi, Nir A. Sochen