Sciweavers

1674 search results - page 101 / 335
» On the Optimality of the ARQ-DDF Protocol
Sort
View
CORR
2007
Springer
73views Education» more  CORR 2007»
13 years 9 months ago
A Case For Amplify-Forward Relaying in the Block-Fading Multi-Access Channel
This paper demonstrates the significant gains that multi-access users can achieve from sharing a single amplify-forward relay in slow fading environments. The proposed protocol, ...
Deqiang Chen, Kambiz Azarian, J. Nicholas Laneman
IJISEC
2002
86views more  IJISEC 2002»
13 years 8 months ago
Using AVL trees for fault-tolerant group key management
In this paper we describe an efficient algorithm for the management of group-keys for Group Communication Systems. Our algorithm is based on the notion of key-graphs, previously u...
Ohad Rodeh, Kenneth P. Birman, Danny Dolev
INFOCOM
2012
IEEE
12 years 7 months ago
Expected loss bounds for authentication in constrained channels
We derive bounds on the expected loss for authentication protocols in channels which are constrained due to noisy conditions and communication costs. This is motivated by a numbe...
Christos Dimitrakakis, Aikaterini Mitrokotsa, Serg...
UIC
2007
Springer
14 years 3 months ago
Mesh-Based Sensor Relocation for Coverage Maintenance in Mobile Sensor Networks
Abstract. Sensor relocation protocols can be employed as fault tolerance approach to offset the coverage loss caused by node failures. We introduce a novel localized structure, in...
Xu Li, Nicola Santoro, Ivan Stojmenovic
SAC
2004
ACM
14 years 2 months ago
Code generation techniques for developing light-weight XML Web services for embedded devices
This paper presents specialized code generation techniques and runtime optimizations for developing light-weight XML Web services for embedded devices. The optimizations are imple...
Robert van Engelen