Sciweavers

256 search results - page 27 / 52
» Network Coding Capacity With a Constrained Number of Coding ...
Sort
View
CSFW
2000
IEEE
13 years 11 months ago
Confidentiality for Mobile Code: The Case of a Simple Payment Protocol
We propose an approach to support confidentiality for mobile implementations of security-sensitive protocols using Java/JVM. An applet which receives and passes on confidential in...
Mads Dam, Pablo Giambiagi
JSAC
2010
147views more  JSAC 2010»
13 years 5 months ago
Joint identity-message coding
In a significant class of sensor-network applications, the identities of the reporting sensors constitute the bulk of the communicated data, whereas the message itself can be as ...
Lorenzo Keller, Mahdi Jafari Siavoshani, Christina...
ADHOCNOW
2008
Springer
13 years 8 months ago
A Prediction Based Cross-Layer MAC/PHY Interface for CDMA Ad Hoc Networks
Variable environments in ad hoc networks require a joint control of physical (PHY) and medium access control (MAC) layers resources in order to optimize performance. In this paper,...
Pegdwindé Justin Kouraogo, François ...
GLOBECOM
2008
IEEE
14 years 1 months ago
A Novel Topology Control Scheme for Future Wireless Mesh Networks
—In this paper, we address the topology control issue for future wireless mesh networks (WMNs). In particular, we propose a novel topology control scheme that attempts to maximiz...
Kejie Lu, Tao Zhang, Yi Qian, Shengli Fu
CORR
2011
Springer
199views Education» more  CORR 2011»
12 years 11 months ago
STiCMAC: A MAC Protocol for Robust Space-Time Coding in Cooperative Wireless LANs
Relay-assisted cooperative wireless communication has been shown to have significant performance gains over the legacy direct transmission scheme. Compared with single relay base...
Pei Liu, Chun Nie, Thanasis Korakis, Elza Erkip, S...