Sciweavers

224 search results - page 19 / 45
» Auctions with Severely Bounded Communication
Sort
View
JNCA
2011
185views more  JNCA 2011»
13 years 2 months ago
Design of a secure distance-bounding channel for RFID
Distance bounding is often proposed as a countermeasure to relay attacks and distance fraud in RFID proximity identification systems. Although several distance-bounding protocols...
Gerhard P. Hancke
JAIR
2002
122views more  JAIR 2002»
13 years 7 months ago
Competitive Safety Analysis: Robust Decision-Making in Multi-Agent Systems
Much work in AI deals with the selection of proper actions in a given (known or unknown) environment. However, the way to select a proper action when facing other agents is quite ...
Moshe Tennenholtz
ICC
2008
IEEE
148views Communications» more  ICC 2008»
14 years 1 months ago
Analysis of Differential Unitary Space-Time Modulation over Non-Identical MIMO Channels
Abstract— We present an analytical study on the error performance of differential unitary space-time modulation (DUSTM) over multiple-input multiple-output (MIMO) channels with n...
Meixia Tao
ICMCS
2005
IEEE
109views Multimedia» more  ICMCS 2005»
14 years 1 months ago
An overview of technologies for e-meeting and e-lecture
Over the past few years, with the rapid adoption of broadband communication and advances in multimedia content capture and delivery, web-based meetings and lectures, also referred...
Berna Erol, Ying Li
INFOCOM
2003
IEEE
14 years 20 days ago
Design and Analysis of an MST-Based Topology Control Algorithm
— In this paper, we present a Minimum Spanning Tree (MST) based topology control algorithm, called Local Minimum Spanning Tree (LMST), for wireless multi-hop networks. In this al...
Ning Li, Jennifer C. Hou, Lui Sha