Sciweavers

899 search results - page 74 / 180
» On Wiretap Networks II
Sort
View
GLOBECOM
2008
IEEE
14 years 3 months ago
Power Allocation in Wireless Relay Networks: A Geometric Programming-Based Approach
—1 In this paper, we consider an amplify-and-forward (AF) wireless relay system where multiple source nodes communicate with their corresponding destination nodes with the help o...
Khoa T. Phan, Tho Le-Ngoc, Sergiy A. Vorobyov, Chi...
ESCIENCE
2005
IEEE
14 years 2 months ago
The SegHidro Experience: Using the Grid to Empower a Hydro-Meteorological Scientific Network
This paper describes our experience with SegHidro, a project that empowers hydro-meteorological researchers by (i) enabling collaborative work via the coupling of computer models,...
Eliane Araújo, Walfredo Cirne, Gustavo Wagn...
INFOCOM
2011
IEEE
13 years 13 days ago
Fast and scalable secret key generation exploiting channel phase randomness in wireless networks
—Recently, there has been great interest in physical layer security techniques that exploit the randomness of wireless channels for securely extracting cryptographic keys. Severa...
Qian Wang, Hai Su, Kui Ren, Kwangjo Kim
ISR
2011
12 years 12 months ago
Compatibility and Proprietary Standards: The Impact of Conversion Technologies in IT Markets with Network Effects
e from http://ssrn.com/abstract=980726 Acknowledgements: The authors thank Ramayya Krishnan, Marshall Van Alstyne, Senior Editor Sanjeev Dewan, the associate editor and referees fo...
Charles Zhechao Liu, Esther Gal-Or, Chris F. Kemer...
INFOCOM
1999
IEEE
14 years 1 months ago
Ring versus Tree Embedding for Real-time Group Multicast
In general topology networks, routing from one node to another over a tree embedded in the network is intuitively a good strategy, since it typically results in a route length of O...
Mario Baldi, Yoram Ofek