Sciweavers

332 search results - page 49 / 67
» Cooperative Relay Networks Using Fountain Codes
Sort
View
144
Voted
CORR
2010
Springer
184views Education» more  CORR 2010»
15 years 3 months ago
Strong Secrecy and Reliable Byzantine Detection in the Presence of an Untrusted Relay
We consider a Gaussian two-hop network where the source and the destination can communicate only via a relay node who is both an eavesdropper and a Byzantine adversary. Both the s...
Xiang He, Aylin Yener
WCNC
2010
IEEE
15 years 7 months ago
A Novel Stability Weighted Clustering Algorithm for Multi-Hop Packet Radio Virtual Cellular Network
—Cooperative communications exploit the spatial diversity inherent in multiuser system by allowing cooperation among users having a wide range of channel qualities. How to search...
Qiyue Yu, Na Zhang, Weixiao Meng, Fumiyuki Adachi
145
Voted
ATAL
2010
Springer
15 years 4 months ago
UAV swarm coordination using cooperative control for establishing a wireless communications backbone
In this paper, we present a mechanism to fly a swarm of UAVs with the aim of establishing a wireless backbone over a pre-specified area. The backbone is aimed at connecting interm...
Achudhan Sivakumar, Colin Keng-Yan Tan
120
Voted
JSAC
2008
110views more  JSAC 2008»
15 years 3 months ago
Designing Multicast Protocols for Non-Cooperative Networks
Conventionally, most network protocols assume that the network entities who participate in the network activities will always behave as instructed. However, in practice, most netwo...
Weizhao Wang, Xiang-Yang Li, Yu Wang 0003, Zheng S...
143
Voted
ISITA
2010
15 years 1 months ago
Outage analysis and optimal power allocation for network-coding-based hybrid AF and DF
Network coding was proposed to increase the achievable throughput of multicast in a network. Recently, combining network coding into user cooperation has attracted research attenti...
Jooha Bek, Jaeyoung Lee, Jun Heo