Sciweavers

2162 search results - page 72 / 433
» A Meta-Notation for Protocol Analysis
Sort
View
IEICET
2007
76views more  IEICET 2007»
13 years 8 months ago
Performance Analysis of IEEE 802.11 DCF in a Multi-Rate WLAN
The IEEE 802.11 family of specifications is by far the most prominent and successful technique for accessing WLANs. Because the channel used by wireless devices is a time-varying...
Weikuo Chu, Yu-Chee Tseng
CORR
2011
Springer
142views Education» more  CORR 2011»
13 years 3 months ago
Power Allocation Games in Interference Relay Channels: Existence Analysis of Nash Equilibria
We consider a network composed of two interfering point-to-point links where the two transmitters can exploit one common relay node to improve their individual transmission rate. ...
Elena Veronica Belmega, Samson Lasaulce
JCAMD
2010
92views more  JCAMD 2010»
13 years 3 months ago
Ligand docking and binding site analysis with PyMOL and Autodock/Vina
Docking of small molecule compounds into the binding site of a receptor and estimating the binding affinity of the complex is an important part of the structurebased drug design pr...
Daniel Seeliger, Bert L. de Groot
TWC
2010
13 years 3 months ago
Multi-hop MIMO relay networks: diversity-multiplexing trade-off analysis
A multi-hop relay network with multiple antenna terminals in a quasi-static slow fading environment is considered. The fundamental diversity-multiplexing gain tradeoff (DMT) is an...
Deniz Gündüz, Mohammad Ali Khojastepour,...
CCS
2010
ACM
13 years 9 months ago
Accountability: definition and relationship to verifiability
Many cryptographic tasks and protocols, such as non-repudiation, contract-signing, voting, auction, identity-based encryption, and certain forms of secure multi-party computation,...
Ralf Küsters, Tomasz Truderung, Andreas Vogt