• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 576
Next 10 →

Verifying Programs with Unreliable Channels (Extended Abstract)

by Parosh Abdulla, Bengt Jonsson - Information and Computation , 1992
"... The research on algorithmic verification methods for concurrent and parallel systems has mostly focussed on finite-state systems, with applications in e.g. communication protocols and hardware systems. For infinite-state systems, e.g. systems that operate on data from unbounded domains, algorithmic ..."
Abstract - Cited by 205 (40 self) - Add to MetaCart
verification is more difficult, since most verification problems are in general undecidable. In this paper, we consider the verification of a particular class of infinite-state systems, namely systems consisting of finite-state processes that communicate via unbounded lossy FIFO channels. This class is able

Reliable Communication over Unreliable Channels

by Yehuda Afek, Hagit Attiya, Alan Fekete, Michael Fischer, Nancy Lynch, Yishay Mansour, Da-wei Wang, Lenore Zuck - JOURNAL OF THE ACM , 1992
"... Layered communication protocols frequently implement a FIFO message facility On top of an unreliable non-FIFO service such as that provided by a packet-switching network. This paper investigates the possibility of implementing a reliable message layer on top of an underlying layer that can lose p ..."
Abstract - Cited by 40 (4 self) - Add to MetaCart
Layered communication protocols frequently implement a FIFO message facility On top of an unreliable non-FIFO service such as that provided by a packet-switching network. This paper investigates the possibility of implementing a reliable message layer on top of an underlying layer that can lose

File Fragmentation over an Unreliable Channel

by Jayakrishnan Nair, Martin Andreasson, Lachlanl. H. Andrew, Stevenh. Low, John C. Doyle
"... Abstract—It has been recently discovered that heavy-tailed file completion time can result from protocol interaction even when file sizes are light-tailed. A key to this phenomenon is the RESTART feature where if a file transfer is interrupted before it is completed, the transfer needs to restart fr ..."
Abstract - Cited by 9 (2 self) - Add to MetaCart
Abstract—It has been recently discovered that heavy-tailed file completion time can result from protocol interaction even when file sizes are light-tailed. A key to this phenomenon is the RESTART feature where if a file transfer is interrupted before it is completed, the transfer needs to restart from the beginning. In this paper, we show that independent or bounded fragmentation produces light-tailed file completion time as long as the file size is light-tailed, i.e., in this case, heavy-tailed file completion time can only originate from heavy-tailed file sizes. If the file size is heavy-tailed, then the file completion time is clearly heavy-tailed. For this case, we show that when the file size distribution is regularly varying, then under independent or bounded fragmentation, the completion time tail distribution function is asymptotically upper bounded by that of the original file size stretched by a constant factor. We then prove that if the

Undecidable Verification Problems for Programs with Unreliable Channels

by Parosh Aziz Abdulla, Bengt Jonsson - Information and Computation , 1994
"... We consider the verification of a particular class of infinite-state systems, namely systems consisting of finite-state processes that communicate via unbounded lossy FIFO channels. This class is able to model e.g. link protocols such as the Alternating Bit Protocol and HDLC. In an earlier paper, we ..."
Abstract - Cited by 65 (13 self) - Add to MetaCart
such as Propositional Linear Time Temporal Logic (PTL) and Computation Tree Logic (CTL). ffl The problem of deciding eventuality properties with fair channels: do all computations eventually reach a given set of states if the unreliable channels satisfy fairness assumptions. The results are obtained through a

On the Design of Control Systems over Unreliable Channels

by Eduardo I. Silva, Graham C. Goodwin, Daniel E. Quevedo , 2009
"... This paper studies LTI one-degree-of-freedom networked control architectures built around LTI SISO plants. The feedback path comprises an unreliable channel that drops data in an i.i.d. fashion. We extend known results to show that there exists a second order moments equivalence between the situatio ..."
Abstract - Cited by 3 (1 self) - Add to MetaCart
This paper studies LTI one-degree-of-freedom networked control architectures built around LTI SISO plants. The feedback path comprises an unreliable channel that drops data in an i.i.d. fashion. We extend known results to show that there exists a second order moments equivalence between

Secure Image Transmission Through Unreliable Channels

by P. Vijayram Reddy, M. Sc (cs, M. Tech (cse, Hyderabad India, K. Venkatesh Sharma, M. Tech (it, P. Radhadevi, M. Tech (cse - International Journal on Computer Science and Engineering , 2010
"... Abstract — The research in the literature on the design of image security by using Arithmetic Coding and Advanced Encryption Standard. Arithmetic Coding offers extremely high coding efficiency and it provides little or no security as traditionally implemented. We present a modified scheme that offer ..."
Abstract - Cited by 2 (0 self) - Add to MetaCart
Abstract — The research in the literature on the design of image security by using Arithmetic Coding and Advanced Encryption Standard. Arithmetic Coding offers extremely high coding efficiency and it provides little or no security as traditionally implemented. We present a modified scheme that offers both security and compression of images. The system utilizes an Arithmetic Coder and Advanced Encryption Standard in which the overall length within the range allocated to each symbol is preserved. The overall system provides simultaneous compression and encryption with negligible coding efficiency by accelerated hardware implementations.

Multiple Distributed Checkpoints over Unreliable Channels

by David L. Cohn, John Saldanha - SEMINARS IN IMMUNOLOGY 12 , 1993
"... ..."
Abstract - Add to MetaCart
Abstract not found

Embedded multiple description coding for progressive image transmission over unreliable channels

by Thomas Guionnet, Christine Guillemot, Stéphane Pateux - International Conference on Image Processing (ICIP , 2001
"... A multiple description scalar quantization (MDSQ) based coding system can be regarded as a source coder (quantizer) followed by a channel coder, i.e. the combination of index and codeword assignment. The redundancy, or the correlation between the descriptions, is controlled by the number of diagonal ..."
Abstract - Cited by 11 (1 self) - Add to MetaCart
of diagonals covered by the index assignment. We consider here the usage of multiple description uniform scalar quantization (that we call MDUSQ) for robust and progressive transmission of images over unreliable channels. The progressive feature is an important factor for rate control in non stationary

The Need for Headers: An Impossibility Result for Communication over Unreliable Channels

by Alan Fekete, Nancy Lynch , 1990
"... It is proved that any protocol that constructs a reliable data link service using a physical channel service necessarily includes in the packets some header information that enables the protocol to treat different packets differently. The physical channel considered is permitted to lose, but not reo ..."
Abstract - Cited by 9 (1 self) - Add to MetaCart
It is proved that any protocol that constructs a reliable data link service using a physical channel service necessarily includes in the packets some header information that enables the protocol to treat different packets differently. The physical channel considered is permitted to lose

ERROR-RESILIENT CODING AND FORWARD ERROR CORRECTION FOR IMAGE TRANSMISSION OVER UNRELIABLE CHANNELS

by Nikolaos V. Boulgouris, Nikolaos Thomos, Michael G. Strintzis
"... An error-resilient coding scheme is proposed for the transmission of images over unreliable channels. Forward Error Correction is used in conjunction with the error-resilient source coder for the protection of the compressed stream. Unlike almost all other robust coding schemes presented todate, the ..."
Abstract - Add to MetaCart
An error-resilient coding scheme is proposed for the transmission of images over unreliable channels. Forward Error Correction is used in conjunction with the error-resilient source coder for the protection of the compressed stream. Unlike almost all other robust coding schemes presented todate
Next 10 →
Results 1 - 10 of 576
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University