Sciweavers

55 search results - page 9 / 11
» New Constructive Approach to Covert Channel Modeling and Cha...
Sort
View
VTC
2007
IEEE
192views Communications» more  VTC 2007»
14 years 1 months ago
Access Scheduling Based on Time Water-Filling for Next Generation Wireless LANs
Opportunistic user access scheduling enhances the capacity of wireless networks by exploiting the multi user diversity. When frame aggregation is used, opportunistic schemes are no...
Ertugrul Necdet Ciftcioglu, Özgür Gü...
IMC
2009
ACM
14 years 2 months ago
Modeling user activities in a large IPTV system
Internet Protocol Television (IPTV) has emerged as a new delivery method for TV. In contrast with native broadcast in traditional cable and satellite TV system, video streams in I...
Tongqing Qiu, Zihui Ge, Seungjoon Lee, Jia Wang, J...
TIT
2010
146views Education» more  TIT 2010»
13 years 2 months ago
Cooperation with an untrusted relay: a secrecy perspective
We consider the communication scenario where a source-destination pair wishes to keep the information secret from a relay node despite wanting to enlist its help. For this scenario...
Xiang He, Aylin Yener
WOWMOM
2005
ACM
130views Multimedia» more  WOWMOM 2005»
14 years 1 months ago
PARMA: A PHY/MAC Aware Routing Metric for Ad-Hoc Wireless Networks with Multi-Rate Radios
Ad-hoc wireless networks with multi-rate radios (such as 802.11a, b, g) require a new class of MAC/PHY aware metrics that take into account factors such as physical-layer link spe...
Suli Zhao, Zhibin Wu, Arup Acharya, Dipankar Raych...
JCP
2007
100views more  JCP 2007»
13 years 7 months ago
Modelling Internet End-to-End Loss Behaviors: A Congestion Control Perspective
— This paper proposes a new approach to modelling and controlling Internet end-to-end loss behaviours. Rather than select the model structure from the loss observations as being ...
Vinh Bui, Weiping Zhu, Ruhul A. Sarker