• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 8
  • Tagged with
  • 8
  • 3
  • 3
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

On spectrally bounded codes for multicarrier communications

Schmidt, Kai-Uwe January 2007 (has links)
Zugl.: Dresden, Techn. Univ., Diss., 2007
2

Iterative synchronization at low signal-to-noise ratios for wireless communications /

Godtmann, Susanne. January 2009 (has links)
Zugl.: Aachen, Techn. Hochsch., Diss., 2009.
3

Video coding with adaptive vector quantization and rate distortion optimization

Wagner, Marcel. Unknown Date (has links) (PDF)
University, Diss., 2000--Freiburg (Breisgau).
4

Efficient receiver methods for coded systems under channel uncertainty

Fonseca dos Santos, André January 2010 (has links)
Zugl.: Dresden, Techn. Univ., Diss., 2010
5

Proxy caching for robust video delivery over lossy networks

Bouazizi, Imed January 2004 (has links) (PDF)
Aachen, Techn. Hochsch., Diss., 2004
6

List decoding of error-correcting codes : winning thesis of the 2002 ACM Doctoral Dissertation Competition /

Guruswami, Venkatesan. January 2004 (has links)
Mass., Massachusetts Inst. of Technology, Diss.--Cambridge, 2001. / Literaturverz. S. [337] - 347.
7

Comparison of Different Secure Network Coding Paradigms Concerning Transmission Efficiency

Pfennig, Stefan, Franz, Elke 07 July 2014 (has links) (PDF)
Preventing the success of active attacks is of essential importance for network coding since even the infiltration of one single corrupted data packet can jam large parts of the network. The existing approaches for network coding schemes preventing such pollution attacks can be divided into two categories: utilize cryptographic approaches or utilize redundancy similar to error correction coding. Within this paper, we compared both paradigms concerning efficiency of data transmission under various circumstances. Particularly, we considered an attacker of a certain strength as well as the influence of the generation size. The results are helpful for selecting a suitable approach for network coding taking into account both security against pollution attacks and efficiency.
8

Comparison of Different Secure Network Coding Paradigms Concerning Transmission Efficiency

Pfennig, Stefan, Franz, Elke January 2013 (has links)
Preventing the success of active attacks is of essential importance for network coding since even the infiltration of one single corrupted data packet can jam large parts of the network. The existing approaches for network coding schemes preventing such pollution attacks can be divided into two categories: utilize cryptographic approaches or utilize redundancy similar to error correction coding. Within this paper, we compared both paradigms concerning efficiency of data transmission under various circumstances. Particularly, we considered an attacker of a certain strength as well as the influence of the generation size. The results are helpful for selecting a suitable approach for network coding taking into account both security against pollution attacks and efficiency.

Page generated in 0.0381 seconds