Sciweavers

358 search results - page 69 / 72
» Model Based Optimal Bit Allocation
Sort
View
CRYPTO
2005
Springer
110views Cryptology» more  CRYPTO 2005»
14 years 1 months ago
The Conditional Correlation Attack: A Practical Attack on Bluetooth Encryption
Motivated by the security of the nonlinear filter generator, the concept of correlation was previously extended to the conditional correlation, that studied the linear correlation...
Yi Lu 0002, Willi Meier, Serge Vaudenay
IWCMC
2006
ACM
14 years 1 months ago
A joint technical and micro-economic investigation of pricing data services over wireless LANs
In this paper, we analyze a wireless LAN hot-spot, based on the IEEE 802.11b protocol, and more specifically we address the issue of defining proper pricing strategies, from bot...
Leonardo Badia, Federico Rodaro, Michele Zorzi
AIPS
2007
13 years 10 months ago
Using Adaptive Priority Weighting to Direct Search in Probabilistic Scheduling
Many scheduling problems reside in uncertain and dynamic environments – tasks have a nonzero probability of failure and may need to be rescheduled. In these cases, an optimized ...
Andrew M. Sutton, Adele E. Howe, L. Darrell Whitle...
DSS
2000
113views more  DSS 2000»
13 years 7 months ago
Quality of service provision in noncooperative networks with diverse user requirements
This paper studies the quality of service (QoS) provision problem in noncooperative networks where applications or users are sel sh and routers implement generalized processor sha...
K. Park, M. Sitharam, S. Chen
MSWIM
2003
ACM
14 years 25 days ago
On the application of traffic engineering over bluetooth ad hoc networks
The seamless communication of data and voice over short-range, point-to-multipoint wireless links between mobile and/or stationary devices is becoming a reality by newly introduce...
Sachin Abhyankar, Rishi Toshniwal, Carlos de M. Co...