Sciweavers

234 search results - page 26 / 47
» An Analysis of Multiple Tutoring Protocols
Sort
View
TWC
2008
119views more  TWC 2008»
13 years 7 months ago
Flow-level performance of opportunistic OFDM-TDMA and OFDMA networks
Abstract--In this paper, the flow-level performance of opportunistic scheduling in orthogonal frequency division multiplexing (OFDM) networks is studied. The analysis accounts for ...
Lei Lei, Chuang Lin, Jun Cai, Xuemin Shen
CAU
2004
192views Cryptology» more  CAU 2004»
13 years 9 months ago
Encrypted? Randomised? Compromised? (When Cryptographically Secured Data is Not Secure)
Protecting data is not simply a case of encrypt and forget: even data with full cryptographic confidentiality and integrity protection can still be subject to information leakage. ...
Mike Bond, Jolyon Clulow
ICC
2007
IEEE
146views Communications» more  ICC 2007»
14 years 2 months ago
Media Access Control with Spatial Correlation for MIMO Ad Hoc Networks
– MIMO (Multiple Input Multiple Output) is capable of offering several-fold increase in spectral efficiency over singleantenna systems through spatial processing. However, curren...
Bing Wen Ke, Ying Jun Zhang, Soung Chang Liew
MSWIM
2003
ACM
14 years 1 months ago
Modeling multicast packet losses in wireless LANs
— The characteristics of wireless packet loss have been studied extensively. Most efforts focus on the temporal loss characteristics at individual stations. For multicast protoco...
Chiping Tang, Philip K. McKinley
INFOCOM
2006
IEEE
14 years 1 months ago
Leveraging Channel Diversity for Key Establishment in Wireless Sensor Networks
— As the use of sensor networks increases, security in this domain becomes a very real concern. One fundamental aspect of providing confidentiality and authentication is key dis...
Matthew J. Miller, Nitin H. Vaidya