Sciweavers

331 search results - page 30 / 67
» Cooperative Security for Network Coding File Distribution
Sort
View
GLOBECOM
2007
IEEE
14 years 2 months ago
Decode-and-Forward Cooperative Relay with Multi-User Detection in Uplink CDMA Networks
Abstract— The use of multi-user detection (MUD) in a cooperative CDMA network is investigated for the uplink in synchronous CDMA systems. Suppose that, at any instant in time, pa...
Wan-Jen Huang, Yao-Win Hong, C. C. Jay Kuo
TIT
2010
156views Education» more  TIT 2010»
13 years 2 months ago
Bandwidth and power allocation for cooperative strategies in Gaussian relay networks
Abstract-- In a relay network with a single sourcedestination pair, we examine the achievable rates with amplifyand-forward (AF) relaying strategy. Motivated by applications in sen...
Ivana Maric, Roy D. Yates
MIDDLEWARE
2007
Springer
14 years 1 months ago
A service-oriented virtual community overlay network for secure external service orchestration
The Service Oriented Architecture (SOA) is used extensively in ubiquitous computing environments. Using external service orchestration, services can be composed into applications....
Shudong Chen, Johan J. Lukkien
CCS
2001
ACM
14 years 4 days ago
Protecting Software Code by Guards
Abstract. Protection of software code against illegitimate modifications by its users is a pressing issue to many software developers. Many software-based mechanisms for protectin...
Hoi Chang, Mikhail J. Atallah
AINA
2005
IEEE
14 years 1 months ago
A Practical Modelling Notation for Secure Distributed Computation
Mobile code computation has lead to a new paradigm of distributed computation. A mobile process can move from site to site and interact with the resources as a local process. To p...
Yih-Jiun Lee, Peter Henderson