Sciweavers

1674 search results - page 138 / 335
» On the Optimality of the ARQ-DDF Protocol
Sort
View
ICC
2009
IEEE
101views Communications» more  ICC 2009»
13 years 6 months ago
Adaptive Bitrate and Resource Allocation for Relay-Assisted ARQ Transmissions
Automatic repeat request (ARQ) protocols deal with the situations where the selected data rate is not supported by the current channel realization. The inappropriate selection is m...
Adrian Agustin, Josep Vidal, Olga Muñoz
ACNS
2009
Springer
142views Cryptology» more  ACNS 2009»
14 years 3 months ago
Group Key Exchange Enabling On-Demand Derivation of Peer-to-Peer Keys
We enrich the classical notion of group key exchange (GKE) protocols by a new property that allows each pair of users to derive an independent peer-to-peer (p2p) key on-demand and ...
Mark Manulis
CRYPTO
2007
Springer
133views Cryptology» more  CRYPTO 2007»
14 years 3 months ago
On Secure Multi-party Computation in Black-Box Groups
Abstract. We study the natural problem of secure n-party computation (in the passive, computationally unbounded attack model) of the n-product function fG(x1, . . . , xn) = x1 · x...
Yvo Desmedt, Josef Pieprzyk, Ron Steinfeld, Huaxio...
PE
2002
Springer
150views Optimization» more  PE 2002»
13 years 8 months ago
Delimiting the range of effectiveness of scalable on-demand streaming
Previous analyses of scalable streaming protocols for delivery of stored multimedia have largely focused on how the server bandwidth required for full-file delivery scales as the ...
Haonan Tan, Derek L. Eager, Mary K. Vernon
EWSN
2004
Springer
14 years 8 months ago
Max-Min Length-Energy-Constrained Routing in Wireless Sensor Networks
We consider the problem of inter-cluster routing between cluster heads via intermediate sensor nodes in a hierarchical sensor network. Sensor nodes having limited and unreplenishab...
Rajgopal Kannan, Lydia Ray, Ramaraju Kalidindi, S....