Sciweavers

2655 search results - page 149 / 531
» LT Network Codes
Sort
View
FOCS
2006
IEEE
14 years 4 months ago
Towards Secure and Scalable Computation in Peer-to-Peer Networks
We consider the problems of Byzantine Agreement and Leader Election, where a constant fraction b < 1/3 of processors are controlled by a malicious adversary. The first problem...
Valerie King, Jared Saia, Vishal Sanwalani, Erik V...
COMGEO
2007
ACM
13 years 10 months ago
Geometric spanners with applications in wireless networks
In this paper we investigate the relations between spanners, weak spanners, and power spanners in RD for any dimension D and apply our results to topology control in wireless netw...
Christian Schindelhauer, Klaus Volbert, Martin Zie...
ISAAC
2004
Springer
170views Algorithms» more  ISAAC 2004»
14 years 4 months ago
Spanners, Weak Spanners, and Power Spanners for Wireless Networks
For c ∈ R, a c-spanner is a subgraph of a complete Euclidean graph satisfying that between any two vertices there exists a path of weighted length at most c times their geometric...
Christian Schindelhauer, Klaus Volbert, Martin Zie...
WCNC
2008
IEEE
14 years 5 months ago
Two-Stage Code Acquisition Employing Search Space Reduction and Iterative Detection in the DS-UWB Downlink
— In this paper we propose and investigate an iterative code acquisition scheme assisted by both search space reduction and iterative Massage Passing (MP), which was designed for...
Seung Hwan Won, Lajos Hanzo
ICMCS
2007
IEEE
149views Multimedia» more  ICMCS 2007»
14 years 5 months ago
Joint Source Coding and Data Rate Adaptation for Multi-User Wireless Video Transmission
Much attention has been paid to the problem of optimally utilizing resources such as spectrum, power and time in order to achieve the best video delivery quality in wireless commu...
Fan Zhai, Zhu Li, Aggelos K. Katsaggelos