Sciweavers

170 search results - page 12 / 34
» A Bounding Quantifier
Sort
View
IRES
2002
85views more  IRES 2002»
13 years 9 months ago
The duality of knowledge
Knowledge Management (KM) is a field that has attracted much attention both in academic and practitioner circles. Most KM projects appear to be primarily concerned with knowledge ...
Paul Hildreth, Chris Kimble
GLOBECOM
2009
IEEE
14 years 1 months ago
Multi-Path Key Establishment against REM Attacks in Wireless Ad Hoc Networks
Secure communications in wireless ad hoc networks require setting up end-to-end secret keys for communicating node pairs. Due to physical limitations and scalability requirements, ...
Tian Lan, Ruby B. Lee, Mung Chiang
ICASSP
2011
IEEE
13 years 1 months ago
Practical limits in RSS-based positioning
Received signal strength (RSS) based source localization papers often ignore the practical effects of range limits in the measurements. In many devices, this results in some senso...
Richard K. Martin, Amanda Sue King, Ryan W. Thomas...
TWC
2008
85views more  TWC 2008»
13 years 9 months ago
Scaling laws of multiple antenna group-broadcast channels
Broadcast (or point to multipoint) communication has attracted a lot of research recently. In this paper, we consider the group broadcast channel where the users' pool is divi...
Tareq Y. Al-Naffouri, Amir F. Dana, Babak Hassibi
INFOCOM
2003
IEEE
14 years 3 months ago
An information theoretic view of network management
—We present an information-theoretic framework for network management for recovery from nonergodic link failures. Building on recent work in the field of network coding, we desc...
Tracey Ho, Muriel Médard, Ralf Koetter