Sciweavers

106 search results - page 13 / 22
» Improvement of the performance using received message on lea...
Sort
View
ICC
2008
IEEE
111views Communications» more  ICC 2008»
14 years 1 months ago
A Systematic Luby Transform Coded V-BLAST System
— Systematic Luby Transform (SLT) codes have shown good performance for single antenna aided systems for transmission over AWGN and uncorrelated Rayleigh fading channels. For the...
Thanh Dang Nguyen, Mohammed El-Hajjar, Lie-Liang Y...
INFOCOM
1999
IEEE
13 years 11 months ago
A Kalman-Filter Method for Power Control in Broadband Wireless Networks
: A Kalman-filter method for power control is proposed for broadband, packet-switched TDMA wireless networks. By observing the temporal correlation of cochannel interference when t...
Kin K. Leung
CORR
2007
Springer
117views Education» more  CORR 2007»
13 years 6 months ago
Perfectly Secure Steganography: Capacity, Error Exponents, and Code Constructions
An analysis of steganographic systems subject to the following perfect undetectability condition is presented in this paper. Following embedding of the message into the covertext,...
Ying Wang, Pierre Moulin
JUCS
2008
156views more  JUCS 2008»
13 years 6 months ago
Efficient k-out-of-n Oblivious Transfer Schemes
Abstract: Oblivious transfer is an important cryptographic protocol in various security applications. For example, in on-line transactions, a k-out-of-n oblivious transfer scheme a...
Cheng-Kang Chu, Wen-Guey Tzeng
GLOBECOM
2006
IEEE
14 years 23 days ago
Rate Adaptation for Cooperative Systems
— Throughput is an important performance measure for data communications over wireless links. In this work, we consider joint adaptation of coding rates, modulation modes and lev...
Zinan Lin, Elza Erkip, Monisha Ghosh