Results 1 - 10
of
5,296
On Scheduling Wireless Broadcast Data
, 1998
"... In mobile distributed systems the data on air can be accessed by a lot of clients. This paper describes the way clients access the wireless broadcasted data in short latency. We define and analyze the problem of wireless data scheduling. For the analysis we propose a measure, named QueryDistance (QD ..."
Abstract
-
Cited by 3 (2 self)
- Add to MetaCart
In mobile distributed systems the data on air can be accessed by a lot of clients. This paper describes the way clients access the wireless broadcasted data in short latency. We define and analyze the problem of wireless data scheduling. For the analysis we propose a measure, named Query
Broadcast Disks: Data Management for Asymmetric Communications Environments
, 1995
"... This paper proposes the use of repetitive broadcast as a way of augmenting the memory hierarchy of clients in an asymmetric communication environment. We describe a new technique called “Broadcast Disks” for structuring the broadcast in a way that provides improved performance for non-uniformly acce ..."
Abstract
-
Cited by 448 (19 self)
- Add to MetaCart
-uniformly accessed data. The Broadcast Disk superimposes multiple disks spinning at different speeds on a single broadcast channel — in effect creating an arbitrarily fine-grained memory hierarchy. In addition to proposing and defining the mechanism, a main result of this work is that exploiting the potential
Fast Decoding for Indexation of Broadcast Data
- Proc. ICSLP'2000
, 2000
"... Processing time is an important factor in making a speech transcription system viable for automatic indexation of radio and television broadcasts. When only concerned by the word error rate, it is common to design systems that run in 100 times real-time or more. This paper addresses issues in reduci ..."
Abstract
-
Cited by 23 (22 self)
- Add to MetaCart
resources led us to reconsider design issues, particularly those concerning the acoustic models and the decoding strategy. A new decoder was implemented which transcribes broadcast data in few times real-time with only a slight increase in word error rate when compared to our best system. Experiments
Attribute-based encryption for fine-grained access control of encrypted data
- In Proc. of ACMCCS’06
, 2006
"... As more sensitive data is shared and stored by third-party sites on the Internet, there will be a need to encrypt data stored at these sites. One drawback of encrypting data, is that it can be selectively shared only at a coarse-grained level (i.e., giving another party your private key). We develop ..."
Abstract
-
Cited by 522 (23 self)
- Add to MetaCart
to decrypt. We demonstrate the applicability of our construction to sharing of audit-log information and broadcast encryption. Our construction supports delegation of private keys which subsumes Hierarchical Identity-Based Encryption (HIBE). E.3 [Data En-
A Digital Fountain Approach to Reliable Distribution of Bulk Data
, 1998
"... The proliferation of applications that must reliably distribute bulk data to a large number of autonomous clients motivates the design of new multicast and broadcast protocols. We describe an ideal, fully scalable protocol for these applications that we call a digital fountain. A digital fountain a ..."
Abstract
-
Cited by 492 (19 self)
- Add to MetaCart
The proliferation of applications that must reliably distribute bulk data to a large number of autonomous clients motivates the design of new multicast and broadcast protocols. We describe an ideal, fully scalable protocol for these applications that we call a digital fountain. A digital fountain
Specification Of Radio Broadcast Data Systems
, 1998
"... ary standard. Because its success is largely dependent on the radio listener#s ability to use the same radio data system receiver in the same manner in any location, it is hoped that broadcasters and equipment manufacturers will comply with the spirit and the letter of this standard. This standard c ..."
Abstract
- Add to MetaCart
ary standard. Because its success is largely dependent on the radio listener#s ability to use the same radio data system receiver in the same manner in any location, it is hoped that broadcasters and equipment manufacturers will comply with the spirit and the letter of this standard. This standard
SPINS: Security Protocols for Sensor Networks
, 2001
"... As sensor networks edge closer towards wide-spread deployment, security issues become a central concern. So far, the main research focus has been on making sensor networks feasible and useful, and less emphasis was placed on security. We design a suite of security building blocks that are optimized ..."
Abstract
-
Cited by 1094 (30 self)
- Add to MetaCart
for resource-constrained environments and wireless communication. SPINS has two secure building blocks: SNEP and TESLA. SNEP provides the following important baseline security primitives: Data con£dentiality, two-party data authentication, and data freshness. A particularly hard problem is to provide efficient
Freenet: A Distributed Anonymous Information Storage and Retrieval System
- INTERNATIONAL WORKSHOP ON DESIGNING PRIVACY ENHANCING TECHNOLOGIES: DESIGN ISSUES IN ANONYMITY AND UNOBSERVABILITY
, 2001
"... We describe Freenet, an adaptive peer-to-peer network application that permits the publication, replication, and retrieval of data while protecting the anonymity of both authors and readers. Freenet operates as a network of identical nodes that collectively pool their storage space to store data ..."
Abstract
-
Cited by 1064 (12 self)
- Add to MetaCart
data files and cooperate to route requests to the most likely physical location of data. No broadcast search or centralized location index is employed. Files are referred to in a location-independent manner, and are dynamically replicated in locations near requestors and deleted from locations
Investigating the Energy Consumption of a Wireless Network Interface in an Ad Hoc Networking Environment
- In IEEE Infocom
, 2001
"... Energy-aware design and evaluation of network protocols requires knowledge of the energy consumption behavior of actual wireless interfaces. But little practical information is available about the energy consumption behavior of well-known wireless network interfaces and device specifications do not ..."
Abstract
-
Cited by 669 (3 self)
- Add to MetaCart
collection of linear equations for calculating the energy consumed in sending, receiving and discarding broadcast and pointto -point data packets of various sizes. Some implications for protocol design and evaluation in ad hoc networks are discussed. Keywords---energy consumption, IEEE 802.11, ad hoc
Energy-Efficient Indexing for Wireless Broadcast Data
"... Mobile computing environment has two kinds of restrictions that others do not have : bandwidth-limitation and energy-restriction. Data broadcasting has many applications in mobile computing because it has two desirable characteristics that overcome above restrictions. There have been some researches ..."
Abstract
- Add to MetaCart
Mobile computing environment has two kinds of restrictions that others do not have : bandwidth-limitation and energy-restriction. Data broadcasting has many applications in mobile computing because it has two desirable characteristics that overcome above restrictions. There have been some
Results 1 - 10
of
5,296