Sciweavers

727 search results - page 54 / 146
» A Calculus of Bounded Capacities
Sort
View
CCS
2011
ACM
12 years 7 months ago
Trace equivalence decision: negative tests and non-determinism
We consider security properties of cryptographic protocols that can be modeled using the notion of trace equivalence. The notion of equivalence is crucial when specifying privacy-...
Vincent Cheval, Hubert Comon-Lundh, Stéphan...
GLOBECOM
2008
IEEE
14 years 2 months ago
Prioritized Maximal Scheduling in Wireless Networks
— This paper considers the scheduling problem in wireless networks. We focus on prioritized maximal scheduling, where a maximal scheduler chooses the links in an order specified...
Qiao Li, Rohit Negi
ICC
2008
IEEE
160views Communications» more  ICC 2008»
14 years 2 months ago
Performance Analysis of Adaptive M-QAM for Rayleigh Fading Cooperative Systems
— The use of constant-power, rate-adaptive M-QAM transmission with an amplify-and-forward cooperative system is proposed. The upper bound expressions are derived for the outage p...
Tyler Nechiporenko, Khoa T. Phan, Chintha Tellambu...
CORR
2006
Springer
117views Education» more  CORR 2006»
13 years 7 months ago
The Gaussian Multiple Access Wire-Tap Channel with Collective Secrecy Constraints
We consider the Gaussian Multiple Access Wire-Tap Channel (GMAC-WT). In this scenario, multiple users communicate with an intended receiver in the presence of an intelligent and in...
Ender Tekin, Aylin Yener
CN
2006
80views more  CN 2006»
13 years 7 months ago
Delay bound and packet scale rate guarantee for some expedited forwarding networks
Expedited Forwarding (EF) is a service defined under the Differentiated Services framework. Based on its recently revised definition in IETF RFC 3246, Packet Scale Rate Guarantee ...
Yuming Jiang