Filters








416 Hits in 5.9 sec

Brief Announcement: Erasure-Resilience Versus Tolerance to Errors

Sofya Raskhodnikova, Nithin Varma, Michael Wagner
2018 International Colloquium on Automata, Languages and Programming  
We describe work in progress on providing a separation between erasure-resilient and tolerant property testing.  ...  Specifically, we are able to exhibit a property which is testable (with the number of queries independent of the length of the input) in the presence of erasures, but is not testable tolerantly.  ...  Specifically, 111:2 Erasure-Resilience Versus Tolerance to Errors we are able to describe a property testable in the erasure-resilient model with the query complexity independent of the input size, but  ... 
doi:10.4230/lipics.icalp.2018.111 dblp:conf/icalp/RaskhodnikovaV18 fatcat:lodxag3g7nbovhql23znj3mgw4

8th International Colloquium on Automata, Languages and Programming (ICALP 81)

1981 IEEE Transactions on Software Engineering  
Announcement: Erasure-Resilience Versus Tolerance to Errors Sofya Raskhodnikova and Nithin Varma . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 111:1-111:3 Brief Announcement  ...  In total 14 brief announcements were accepted for publication: 10 for Track A and 4 for Track C. The selection of the brief announcements was made by the Program Committees.  ... 
doi:10.1109/tse.1981.234528 fatcat:ob65j2ybgzbgba6y6ar7bczb6a

Neighbor Discovery for Wireless Networks via Compressed Sensing [article]

Lei Zhang, Jun Luo, Dongning Guo
2012 arXiv   pre-print
The second scheme needs much lower signal-to-noise ratio (SNR) to achieve the same error performance.  ...  The compressed neighbor discovery schemes are much more efficient than conventional random-access discovery, where nodes have to retransmit over many frames with random delays to be successfully discovered  ...  Nodes contend to announce their NIAs over a sequence of k contention periods.  ... 
arXiv:1012.1007v4 fatcat:mtubspc34vgnhnzrsdggntxqqm

Neighbor discovery for wireless networks via compressed sensing

Lei Zhang, Jun Luo, Dongning Guo
2013 Performance evaluation (Print)  
The second scheme needs much lower signal-to-noise ratio (SNR) to achieve the same error performance.  ...  The compressed neighbor discovery schemes are much more efficient than conventional random-access discovery, where nodes have to retransmit over many frames with random delays to be successfully discovered  ...  Nodes contend to announce their NIAs over a sequence of k contention periods.  ... 
doi:10.1016/j.peva.2012.05.003 fatcat:e2gykf4yqra2ze625oameof54i

ACM SIGACT news distributed computing column 32

Idit Keidar
2008 ACM SIGACT News  
Thanks to Cyril Gavoille, Phuong Hoai Ha, David Ilcinkas, Hyonho Lee, Yee Jiun Song, Gadi Taubenfeld, and Shmuel Zaks for sharing their excellent photos.  ...  and 40 regular papers and 44 brief announcements were selected by the program committee.  ...  The authors propose a new Byzantine fault-tolerant SMR protocol, resilient to performance degradation under attacks.  ... 
doi:10.1145/1466390.1466402 fatcat:ygqihi4p5vfnfnmzufwi2fnyk4

Approximate Networking for Universal Internet Access

Junaid Qadir, Arjuna Sathiaseelan, Umar Farooq, Muhammad Usama, Muhammad Imran, Muhammad Shafique
2017 Future Internet  
the area, power, and performance efficiency of systems by orders of magnitude by embracing output errors in resilient applications.  ...  According to recent statistics, almost six billion people do not have high-speed internet, which makes them unable to fully participate in the digital economy [1] .  ...  Author Contributions: All authors contributed equally to this work.  ... 
doi:10.3390/fi9040094 fatcat:flvo2uusrrde3gzckys4f45l4u

Parity-Checked Strassen Algorithm [article]

Hsin-Po Wang, Iwan Duursma
2022 arXiv   pre-print
To multiply astronomic matrices using parallel workers subject to straggling, we recommend interleaving checksums with some fast matrix multiplication algorithms.  ...  Then the entry products sent from any 8 workers suffice to assemble the matrix product. (B) 754 workers multiply two 9× 9 matrices.  ...  To rephrase it, Pluto code tolerates three erasures out of thirteen computations. Proof. By the lemma.  ... 
arXiv:2011.15082v3 fatcat:bfvzvx6qsnhyzhhj5bfpehbcoi

DVB-H: Digital Broadcast Services to Handheld Devices

G. Faria, J.A. Henriksson, E. Stare, P. Talmola
2006 Proceedings of the IEEE  
The new extension brings features that make it possible to receive digital video broadcast type services in handheld, mobile terminals.  ...  The paper discusses the key technology elements-4K mode and in-depth interleavers, time slicing and additional forward error correction-in some detail.  ...  ACKNOWLEDGMENT The authors would like to thank the DVB organization, The DVB Project office, and the ad hoc groupof technical  ... 
doi:10.1109/jproc.2005.861011 fatcat:pf7uwz2n6zeo7odkzszbryu2h4

User-Centric Energy-Efficient Multimedia Multicast/Broadcast Solutions: A Survey

Chetna Singhal, Swades De
2015 EAI Endorsed Transactions on Ubiquitous Environments  
Multimedia Multicast/Broadcast Challenges Unicast versus Multicast/Broadcast The 'Always Best Connected' scenario envisions a heterogeneous wireless environment where the switchover from one network technology  ...  to the other, and from one transmission type to another, needs to be done seamlessly -ideally matching the users' monetary cost/energy/QoS preferences.  ...  Popular congestion control mechanisms (window-based, layer-based, rate based) and error control techniques (ARQ, FEC, error-resilient source coding) for multicast communication were noted.  ... 
doi:10.4108/ue.2.5.e4 fatcat:spr7lo6yirdn5kwrghv5jxtqwe

Trends in big data analytics

Karthik Kambatla, Giorgos Kollias, Vipin Kumar, Ananth Grama
2014 Journal of Parallel and Distributed Computing  
Considerations of fault-tolerance, security, and access control are critical in many applications (Dean and Ghemawat, 2004; Apache hadoop).  ...  Networks such as Napster, Gnutella, and BitTorrent allowed peer nodes to share content -typically multimedia data -directly among one another in a decentralized manner.  ...  Erasure-coding techniques would automatically correct disk errors as well. Network usage within a datacenter can be improved using techniques like TCP Nice [90] and Dr. Multicast [92] .  ... 
doi:10.1016/j.jpdc.2014.01.003 fatcat:2v52tvp4tff7xh3cma5gdnlxgq

A Cross-Layer Path Selection Scheme for Video Streaming over Vehicular Ad-Hoc Networks

Mahdi Asefi, Jon W. Mark, Xuemin Shen
2010 2010 IEEE 72nd Vehicular Technology Conference - Fall  
Numerical results demonstrate the gain achieved by the proposed routing scheme versus geographic greedy forwarding in terms of video frame distortion and streaming start-up delay in several urban communication  ...  It has been a tremendous pleasure to work with them and I wish to take this opportunity to thank them for their constant encouragement and patience.  ...  or hybrid ARQ along with error resilient video coding schemes and error concealment strategies at the application layer, and 4) packetization optimization at the various layers [68] .  ... 
doi:10.1109/vetecf.2010.5594547 dblp:conf/vtc/AsefiMS10 fatcat:txqymchwxvd7tnvl6qlp5wqavi

Advances in Quantum Cryptography

Stefano Pirandola, Ulrik Andersen, Leonardo Banchi, Mario Berta, Darius Bunandar, Roger Colbeck, Dirk Englund, Tobias Gehring, Cosmo Lupo, Carlo Ottaviani, Jason Pereira, Mohsen Razavi (+6 others)
2020 Advances in Optics and Photonics  
You may freely distribute the URL identifying the publication in the public portal If you believe that this document breaches copyright please contact us providing details, and we will remove access to  ...  In the quantum case, not only we have to correct the bit flip errors, but also phase flip and erasure errors in possibly a fault-tolerant way.  ...  [711] , although this lacked tolerance to noise. Quantum security with error tolerance was proven in Ref. [168] and improved in Ref.  ... 
doi:10.1364/aop.361502 fatcat:7xp7i42fjffpblk6g4fhlpgg6m

A Survey of Digital Television Broadcast Transmission Techniques

Mohammed El-Hajjar, Lajos Hanzo
2013 IEEE Communications Surveys and Tutorials  
demand for High-Definition (HD) TV, videoon-demand and mobile TV services, there was a real need for more bandwidth-efficient, flawless and crisp video quality, which motivated the migration from analogue to  ...  In this paper we present a brief history of the development of TV and then we survey the transmission technology used in different digital terrestrial, satellite, cable and mobile TV standards in different  ...  Its tolerance to impulsive interference was also enhanced by the MPE-FEC [31] .  ... 
doi:10.1109/surv.2013.030713.00220 fatcat:qyqz4hclcrgdbmw2efbtzifn7a

Applications of Derandomization Theory in Coding [article]

Mahdi Cheraghchi
2011 pre-print
to coding theory.  ...  Finally, we design ensembles of error-correcting codes that achieve the information-theoretic capacity of a large class of communication channels, and then use the obtained ensembles for construction of  ...  Codes for the Binary Erasure Channel Any code with minimum distance d can tolerate up to d − 1 erasures in the worst case 3 .  ... 
doi:10.5075/epfl-thesis-4767 arXiv:1107.4709v1 fatcat:gq43kigbzzapvp6r5wxgb3i7ym

Quantum cryptography beyond quantum key distribution

Anne Broadbent, Christian Schaffner
2015 Designs, Codes and Cryptography  
Quantum cryptography is the art and science of exploiting quantum mechanical effects in order to perform cryptographic tasks.  ...  We also thank Ronald Mullin for his invitation to submit this paper to the 25th anniversary edition of Designs, Codes and Cryptography, and an anonymous reviewer for helpful comments.  ...  the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.  ... 
doi:10.1007/s10623-015-0157-4 pmid:32226229 pmcid:PMC7089691 fatcat:zm7zdq4l6babtd4y5ygwmttt2q
« Previous Showing results 1 — 15 out of 416 results