Sciweavers

368 search results - page 4 / 74
» The Information Lost in Erasures
Sort
View
JKM
2006
122views more  JKM 2006»
13 years 8 months ago
Where is the knowledge we have lost in managers?
Purpose
John P. Girard
P2P
2008
IEEE
137views Communications» more  P2P 2008»
14 years 2 months ago
Hierarchical Codes: How to Make Erasure Codes Attractive for Peer-to-Peer Storage Systems
Redundancy is the basic technique to provide reliability in storage systems consisting of multiple components. A redundancy scheme defines how the redundant data are produced and...
Alessandro Duminuco, Ernst Biersack
QSHINE
2005
IEEE
14 years 2 months ago
Adaptive Low-Complexity Erasure-Correcting Code-Based Protocols for QoS-Driven Mobile Multicast Services
—We propose an adaptive hybrid automatic repeat request–forward error correction (ARQ–FEC) erasure-correcting scheme for quality of service (QoS)-driven mobile multicast serv...
Qinghe Du, Xi Zhang
CSFW
2008
IEEE
13 years 10 months ago
End-to-End Enforcement of Erasure and Declassification
Declassification occurs when the confidentiality of information is weakened; erasure occurs when the confidentiality of information is strengthened, perhaps to the point of comple...
Stephen Chong, Andrew C. Myers
CDC
2009
IEEE
111views Control Systems» more  CDC 2009»
14 years 1 months ago
On fusion of information from multiple sensors in the presence of analog erasure links
— Consider multiple sensors that transmit data over analog erasure links to an estimation center. The sensors have access to distinct entries of the output vector of a linear and...
Vijay Gupta, Nuno C. Martins