A Collaboration: Network Coding + Reliability
true XORing two packets Access nodes and other network devices see a packet as a string of 0s ... node opens the packets and XORs the two packets’ bit strings to form a new coded packet

The Data-Driven Approach to Network Management: Innovation Delivered
be caused by interruptions in physical connectivity, data corruption or packet loss in transport, and even ... on these events allows smaller and more transitory glitches, such as short burst

Cybersecurity: What are the Right Questions?
electronic communications from circuit-switched networks to packet-routed ones. The Internet ...

DataDepot
DataDepot and its associated toolchain enable the fast construction and easy maintenance of very large real-time stream warehouses.

Reibman, Amy R.
image and video quality estimation, Reibman

Predicting packet-loss visibility using scene characteristics
Predicting packet-loss visibility using scene characteristics Amy R. Reibman and David Poole AT& ... content on the visibility of packet loss impairments in MPEG-2 and H.264 compress

Characterizing packet-loss impairments in compressed video
Characterizing packet-loss impairments in compressed video Amy R. Reibman and David Poole AT&T ... of packet losses in MPEG-2 and H.264 compressed video. We use subjective data that

Browsing and Retrieval of Full Broadcast-Quality Video
David Gibbon, David Gibbon, David Gibbon, David Gibbon, David Gibbon, David Gibbon Browsing and Retrieval of Full BroadcastQuality Video April Proc 10th International Workshop on Packet Video Packet Video 99

mobisys08-slyfi
introduces in packet delivery is only slightly higher than that added by WPA-CCMP encryption (10% vs. 3 ... practice to use standards such as WPA for 802.11 to encrypt packet contents.