Sciweavers

403 search results - page 30 / 81
» Bits through ARQs
Sort
View
MOBICOM
2004
ACM
14 years 25 days ago
Performance evaluation of safety applications over DSRC vehicular ad hoc networks
In this paper we conduct a feasibility study of delay-critical safety applications over vehicular ad hoc networks based on the emerging dedicated short range communications (DSRC)...
Jijun Yin, Tamer A. ElBatt, Gavin Yeung, Bo Ryu, S...
SADFE
2010
IEEE
13 years 5 months ago
Fonts for Forensics
: Like other latent evidence that cannot be directly perceived by people, bit sequences have to be presented through tools. Presentations of digital forensic evidence often involve...
Fred Cohen
ICIP
2003
IEEE
14 years 9 months ago
Channel aware unequal error protection for image transmission over broadband wireless LAN
Orthogonal Frequency Division Multiplexing (OFDM) has been adopted in many broadband wireless communication standards. In OFDM systems, channel estimation is a crucial module in co...
Charles Pandana, Yan Sun, K. J. Ray Liu
CTRSA
2009
Springer
155views Cryptology» more  CTRSA 2009»
14 years 2 months ago
Cryptanalysis of CTC2
CTC is a toy cipher designed in order to assess the strength of algebraic attacks. While the structure of CTC is deliberately weak with respect to algebraic attacks, it was claimed...
Orr Dunkelman, Nathan Keller
ICC
2008
IEEE
171views Communications» more  ICC 2008»
14 years 1 months ago
On the Capacity of Training-Based Transmissions with Input Peak Power Constraints
— 1 In this paper, training-based transmissions over a priori unknown Rayleigh block fading channels are considered. The input signals are assumed to be subject to peak power con...
Mustafa Cenk Gursoy