-
1
-
-
0000629443
-
Dynamic source routing in ad hoc wireless networks
-
edited by T. Imielinski and H. Korth, chapter 5, Kluwer Academic Publishers
-
D. B. Johnson and D. A. Maltz: Dynamic source routing in ad hoc wireless networks. Mobile Computing, edited by T. Imielinski and H. Korth, chapter 5, pp. 153-181. Kluwer Academic Publishers (1996)
-
(1996)
Mobile Computing
, pp. 153-181
-
-
Johnson, D.B.1
Maltz, D.A.2
-
3
-
-
0035015898
-
Investigating the Energy Consumption of a Wireless Network Interface in an Ad Hoc Networking Environment
-
Anchorage AK
-
th INFOCOM, Vol. 3, Anchorage AK (2001) 1548-1557
-
(2001)
th INFOCOM
, vol.3
, pp. 1548-1557
-
-
Feeney, L.M.1
Nilsson, M.2
-
5
-
-
0025419861
-
Coda: A highly available file system for a distributed workstation environment
-
Satyanarayanan, M.; Kistler, J.J.; Kumar, P.; Okasaki, M.E.; Siegel, E.H.; Steere : Coda: a highly available file system for a distributed workstation environment. IEEE Transactions on Computers, Vol.39 (4) (1990) 447-459
-
(1990)
IEEE Transactions on Computers
, vol.39
, Issue.4
, pp. 447-459
-
-
Satyanarayanan, M.1
Kistler, J.J.2
Kumar, P.3
Okasaki, M.E.4
Siegel, E.H.5
Steere6
-
6
-
-
84883505875
-
Serverless Network File System
-
Copper Mountain Resort, Colorado
-
th Symposium on Operating System Principles, Copper Mountain Resort, Colorado (1995) 109-126
-
(1995)
th Symposium on Operating System Principles
, pp. 109-126
-
-
Anderson, T.E.1
Dahlin, M.2
Neefe, J.3
Patterson, D.4
Roselli, D.5
Wang, R.6
-
7
-
-
84864878161
-
Designing secure and reliable applications using fragmentation-redundancy-scattering: An object-oriented approach
-
Berlin, Germany
-
J. C. Fabre, Y. Deswarte, and B. Randell. "Designing secure and reliable applications using fragmentation-redundancy-scattering: an object-oriented approach. Proc. 1st European Dependable Computing Conference, Berlin, Germany (1994) 21-38
-
(1994)
Proc. 1st European Dependable Computing Conference
, pp. 21-38
-
-
Fabre, J.C.1
Deswarte, Y.2
Randell, B.3
-
8
-
-
0033279537
-
A Prototype Implementation of Archival Intermemory
-
Berkeley, CA
-
th Conference on Digital libraries, Berkeley, CA (1999) 28-37
-
(1999)
th Conference on Digital Libraries
, pp. 28-37
-
-
Chen, Y.1
Edler, J.2
Goldberg, A.3
Gottlieb, A.4
Sobti, S.5
Yianilos, P.6
-
10
-
-
0024641589
-
Efficient Dispersal of Information for Security, Load Balancing, and Fault Tolerance
-
M. O. Rabin : Efficient Dispersal of Information for Security, Load Balancing, and Fault Tolerance. Journal of the ACM, Vol.36, (2) (1989) 335-348
-
(1989)
Journal of the ACM
, vol.36
, Issue.2
, pp. 335-348
-
-
Rabin, M.O.1
-
11
-
-
0031122982
-
Effective Erasure Codes for Reliable Computer Communication Protocols
-
L. Rizzo : Effective Erasure Codes for Reliable Computer Communication Protocols. ACM Computer Communication Review, Vol. 27 (2) (1997) 24-36
-
(1997)
ACM Computer Communication Review
, vol.27
, Issue.2
, pp. 24-36
-
-
Rizzo, L.1
-
13
-
-
0015603268
-
Error Correcting Properties of Redundant Residue Number Systems
-
F. Barsi and P. Maestrini : Error Correcting Properties of Redundant Residue Number Systems. IEEE Transactions on Computers, Vol. C-22 (3) (1973) 307-315
-
(1973)
IEEE Transactions on Computers
, vol.C-22
, Issue.3
, pp. 307-315
-
-
Barsi, F.1
Maestrini, P.2
-
14
-
-
0000262556
-
Error Correction in Residue Arithmetic
-
D. Mandelbaum : Error Correction in Residue Arithmetic. IEEE Transactions on Computers, Vol. C-21 (6) (1972) 538-545
-
(1972)
IEEE Transactions on Computers
, vol.C-21
, Issue.6
, pp. 538-545
-
-
Mandelbaum, D.1
-
16
-
-
0016872396
-
On a Class of Arithmetic Codes and Decoding Algorithm
-
D. Mandelbaum : On a Class of Arithmetic Codes and Decoding Algorithm. IEEE Transactions on Information Theory, Vol. IT-21 (1976) 85-88
-
(1976)
IEEE Transactions on Information Theory
, vol.IT-21
, pp. 85-88
-
-
Mandelbaum, D.1
-
17
-
-
0037800872
-
Improved Decoding Algorithms for Arithmetic Residues Codes
-
F. Barsi and P. Maestrini: Improved Decoding Algorithms for Arithmetic Residues Codes. IEEE Transactions on Information Theory, Vol. IT-24 (1978) 640-643
-
(1978)
IEEE Transactions on Information Theory
, vol.IT-24
, pp. 640-643
-
-
Barsi, F.1
Maestrini, P.2
-
18
-
-
0026679190
-
A coding theory approach to error control in redundant residue number systems. II. Multiple Error detection and correction
-
J. D. Sun and H. Krishna: A coding theory approach to error control in redundant residue number systems. II. Multiple Error detection and correction. IEEE Transactions on Circuits and Systems II: Analog and Digital Signal Processing, 39 (1) (1992) 18-34
-
(1992)
IEEE Transactions on Circuits and Systems II: Analog and Digital Signal Processing
, vol.39
, Issue.1
, pp. 18-34
-
-
Sun, J.D.1
Krishna, H.2
-
19
-
-
0003597645
-
-
IEEE Press,NY
-
M. Soderstrand, W. K. Jenkins, G. A. Jullien and F. J. Taylor, Residue Number Arithmetic: Modem Applications in Digital Signal Processing, IEEE Press,NY (1986)
-
(1986)
Residue Number Arithmetic: Modem Applications in Digital Signal Processing
-
-
Soderstrand, M.1
Jenkins, W.K.2
Jullien, G.A.3
Taylor, F.J.4
-
20
-
-
35048891868
-
Keying hash functions for message authentication
-
Advances in Cryptology - Crypto 96 Proceedings, N. Koblitz ed, Springer-Verlag
-
M. Bellare, R. Canetti, and H. Krawczyk: Keying hash functions for message authentication, in Advances in Cryptology - Crypto 96 Proceedings, LNCS Vol. 1109, N. Koblitz ed, Springer-Verlag (1996)
-
(1996)
LNCS Vol. 1109
, vol.1109
-
-
Bellare, M.1
Canetti, R.2
Krawczyk, H.3
-
21
-
-
0034777649
-
Intercepting mobile communications: The insecurity of 802.11
-
Rome, Italy
-
Nikita Borisov, Ian Goldberg, David Wagner: Intercepting mobile communications: the insecurity of 802.11. MOBICOM 2001, Rome, Italy (2001) 180-189
-
(2001)
MOBICOM 2001
, pp. 180-189
-
-
Borisov, N.1
Goldberg, I.2
Wagner, D.3
|