Sciweavers

7133 search results - page 1320 / 1427
» Communication algorithms with advice
Sort
View
108
Voted
TIT
2010
82views Education» more  TIT 2010»
14 years 10 months ago
Average message delivery time for small-world networks in the continuum limit
Small-world networks are networks in which the graphical diameter of the network is as small as the diameter of random graphs but whose nodes are highly clustered when compared wit...
Hazer Inaltekin, Mung Chiang, H. Vincent Poor
144
Voted
TSE
2010
230views more  TSE 2010»
14 years 10 months ago
Vulnerability Discovery with Attack Injection
The increasing reliance put on networked computer systems demands higher levels of dependability. This is even more relevant as new threats and forms of attack are constantly being...
João Antunes, Nuno Ferreira Neves, Miguel C...
118
Voted
TWC
2010
14 years 10 months ago
A framework for statistical wireless spectrum occupancy modeling
Abstract--In this paper, we propose a novel spectrum occupancy model designed to generate accurate temporal and frequency behavior of various wireless transmissions. Our proposed w...
Chittabrata Ghosh, Srikanth Pagadarai, Dharma P. A...
178
Voted
CSCW
2011
ACM
14 years 10 months ago
Scheduling in variable-core collaborative systems
The performance of a collaborative system depends on how two mandatory collaborative tasks, processing and transmission of user commands, are scheduled. We have developed multiple...
Sasa Junuzovic, Prasun Dewan
ICASSP
2011
IEEE
14 years 7 months ago
Cooperation strategies for secrecy in MIMO relay networks with unknown eavesdropper CSI
We investigate secure communications for a four-node relayeavesdropper channel with multiple data stream transmission, assuming that the eavesdropper’s channel state information...
Jing Huang, A. Lee Swindlehurst
« Prev « First page 1320 / 1427 Last » Next »