Sciweavers

45 search results - page 6 / 9
» A complete characterization of a family of key exchange prot...
Sort
View
JCIT
2010
197views more  JCIT 2010»
13 years 1 months ago
Comparative Study of M/Er/1 and M/M/1 Queuing Delay Models of the two IP-PBXs
Voice over Internet Protocol (VoIP) is a general term for a family of transmission technologies to delivery of voice communications over IP networks such as the Internet or other ...
Alireza Dehestani, Pedram Hajipour
ICIAR
2005
Springer
14 years 13 days ago
A Step Towards Practical Steganography Systems
There has been many hidden communication techniques proposed in the last few years. The focus was given to steganography to build such techniques. Utilizing stego-key(s) to hide se...
Abdelkader H. Ouda, Mahmoud R. El-Sakka
CORR
2007
Springer
114views Education» more  CORR 2007»
13 years 7 months ago
On the Throughput of Secure Hybrid-ARQ Protocols for Gaussian Block-Fading Channels
—The focus of this paper is an information-theoretic study of retransmission protocols for reliable packet communication under a secrecy constraint. The hybrid automatic retransm...
Xiaojun Tang, Ruoheng Liu, Predrag Spasojevic, H. ...
SAS
2000
Springer
13 years 10 months ago
A Transformational Approach for Generating Non-linear Invariants
Computing invariants is the key issue in the analysis of infinite-state systems whether analysis means testing, verification or parameter synthesis. In particular, methods that all...
Saddek Bensalem, Marius Bozga, Jean-Claude Fernand...
INFOCOM
2006
IEEE
14 years 29 days ago
A Power-Saving Multi-Radio Multi-Channel MAC Protocol for Wireless Local Area Networks
— Opportunistic spectrum access and adaptive power management are effective techniques to improve throughput, delay performance, and energy efficiency for wireless networks. In ...
Jianfeng Wang, Yuguang Fang, Dapeng Oliver Wu