Sciweavers

3341 search results - page 532 / 669
» A Communication Virtual Machine
Sort
View
SCN
2010
Springer
122views Communications» more  SCN 2010»
13 years 7 months ago
A New Security Model for Authenticated Key Agreement
The Canetti–Krawczyk (CK) and extended Canetti–Krawczyk (eCK) security models, are widely used to provide security arguments for key agreement protocols. We discuss security s...
Augustin P. Sarr, Philippe Elbaz-Vincent, Jean-Cla...
GLOBECOM
2010
IEEE
13 years 7 months ago
Reinforcement Learning for Link Adaptation in MIMO-OFDM Wireless Systems
Machine learning algorithms have recently attracted much interest for effective link adaptation due to their flexibility and ability to capture more environmental effects implicitl...
Sungho Yun, Constantine Caramanis
SECON
2010
IEEE
13 years 7 months ago
Deconstructing Interference Relations in WiFi Networks
Abstract--Wireless interference is the major cause of degradation of capacity in 802.11 wireless networks. We present an approach to estimate the interference between nodes and lin...
Anand Kashyap, Utpal Paul, Samir R. Das
SIGSOFT
2010
ACM
13 years 7 months ago
Realizability analysis for message-based interactions using shared-state projections
The global interaction behavior in message-based systems can be specified as a finite-state machine defining acceptable sequences of messages exchanged by a group of peers. Realiz...
Sylvain Hallé, Tevfik Bultan
VTC
2010
IEEE
132views Communications» more  VTC 2010»
13 years 7 months ago
Throughput Analysis of General Network Coding Nodes Based on SW-ARQ Transmission
The steady-state throughput of general network coding node is investigated, when data is transmitted in packets based on the stopand-wait automatic repeat request (SW-ARQ) error-co...
Yang Qin, Lie-Liang Yang