Sciweavers

2421 search results - page 106 / 485
» Message from the Co-Chairs
Sort
View
ADHOC
2007
133views more  ADHOC 2007»
13 years 9 months ago
Secure position-based routing protocol for mobile ad hoc networks
In large and dense mobile ad hoc networks, position-based routing protocols can offer significant performance improvement over topology-based routing protocols by using location...
Joo-Han Song, Vincent W. S. Wong, Victor C. M. Leu...
CORR
2010
Springer
160views Education» more  CORR 2010»
13 years 9 months ago
An LSB Data Hiding Technique Using Natural Numbers
In this paper, a novel data hiding technique is proposed, as an improvement over the Fibonacci LSB data-hiding technique proposed by Battisti et al. [1] based on decomposition of ...
Sandipan Dey, Ajith Abraham, Sugata Sanyal
CORR
2008
Springer
106views Education» more  CORR 2008»
13 years 9 months ago
Resource Allocation and Relay Selection for Collaborative Communications
Abstract--We investigate the relay selection problem in a network where users are able to collaborate with each other; decode and forward the messages of each other along with thei...
Saeed Akhavan-Astaneh, Saeed Gazor
IPL
2008
72views more  IPL 2008»
13 years 9 months ago
Reducing communication costs in robust peer-to-peer networks
Several recent research results describe how to design Distributed Hash Tables (DHTs) that are robust to adversarial attack via Byzantine faults. Unfortunately, all of these resul...
Jared Saia, Maxwell Young
JACM
2008
90views more  JACM 2008»
13 years 9 months ago
Bit complexity of breaking and achieving symmetry in chains and rings
We consider a failure-free, asynchronous message passing network with n links, where the processors are arranged on a ring or a chain. The processors are identically programmed bu...
Yefim Dinitz, Shlomo Moran, Sergio Rajsbaum