Sciweavers

235 search results - page 35 / 47
» An Analytical Approach for Throughput Evaluation of Wireless...
Sort
View
DAC
2007
ACM
14 years 8 months ago
Program Mapping onto Network Processors by Recursive Bipartitioning and Refining
Mapping packet processing applications onto embedded network processors (NP) is a challenging task due to the unique constraints of NP systems and the characteristics of network a...
Jia Yu, Jingnan Yao, Jun Yang 0002, Laxmi N. Bhuya...
INFOCOM
2009
IEEE
14 years 2 months ago
Null Keys: Limiting Malicious Attacks Via Null Space Properties of Network Coding
—The performance of randomized network coding can suffer significantly when malicious nodes corrupt the content of the exchanged blocks. Previous work have introduced error corr...
Elias Kehdi, Baochun Li
VTC
2010
IEEE
136views Communications» more  VTC 2010»
13 years 6 months ago
HARQ Aided Systematic LT Coding for Amplify-Forward and Decode-Forward Cooperation
—Systematic Luby Transform (SLT) codes constitute rateless codes, which are capable of adaptively adjusting their code rate depending on the channel quality without explicit chan...
Hoang Anh Ngo, Thanh Dang Nguyen, Lajos Hanzo
INFOCOM
2009
IEEE
14 years 2 months ago
Rateless Coding with Feedback
The erasure resilience of rateless codes, such as Luby-Transform (LT) codes, makes them particularly suitable to a wide variety of loss-prone wireless and sensor network applicati...
Andrew Hagedorn, Sachin Agarwal, David Starobinski...
GLOBECOM
2009
IEEE
13 years 11 months ago
Collision-Free Asynchronous Multi-Channel Access in Ad Hoc Networks
Abstract—In this paper, we present a collision-free asynchronous multi-channel access protocol for Ad Hoc wireless networks using a single transceiver. Our protocol, dubbed AMMAC...
Duy Nguyen, J. J. Garcia-Luna-Aceves, Katia Obracz...