Sciweavers

544 search results - page 94 / 109
» On achieving optimal throughput with network coding
Sort
View
ESAS
2004
Springer
14 years 2 months ago
Public Key Cryptography in Sensor Networks - Revisited
The common perception of public key cryptography is that it is complex, slow and power hungry, and as such not at all suitable for use in ultra-low power environments like wireless...
Gunnar Gaubatz, Jens-Peter Kaps, Berk Sunar
ICC
2009
IEEE
200views Communications» more  ICC 2009»
14 years 3 months ago
Fast Distributed Multi-Cell Scheduling with Delayed Limited-Capacity Backhaul Links
— Both fast scheduling and spatial signal processing have proven to be capacity-increasing methods in wireless communication systems. However, when applied in the downlink of a c...
Ralf Bendlin, Yih-Fang Huang, Michel T. Ivrlac, Jo...
CORR
2010
Springer
98views Education» more  CORR 2010»
13 years 8 months ago
Linear Operator Channels over Finite Fields
Motivated by random linear network coding, we study the communication through channels, called linear operator channels (LOCs), that perform linear operation over finite fields. Fo...
Shenghao Yang, Siu-Wai Ho, Jin Meng, En-Hui Yang
EUROSYS
2010
ACM
14 years 5 months ago
The Next 700 BFT Protocols
Modern Byzantine fault-tolerant state machine replication (BFT) protocols involve about 20.000 lines of challenging C++ code encompassing synchronization, networking and cryptogra...
Rachid Guerraoui, Nikola Knezevic, Vivien Quéma, ...
PE
2008
Springer
113views Optimization» more  PE 2008»
13 years 8 months ago
Joint uplink and downlink admission control to both streaming and elastic flows in CDMA/HSDPA systems
TCP-based data flows generate packets and ACKs in two directions, be it in the wireline or wireless networks. In the latter case, packets are typically found in the downlink where...
Tijani Chahed, Eitan Altman, Salah-Eddine Elayoubi