Sciweavers

404 search results - page 56 / 81
» Optimization of Split-And-Combine Relaying
Sort
View
CANS
2009
Springer
180views Cryptology» more  CANS 2009»
14 years 2 months ago
RFID Distance Bounding Protocol with Mixed Challenges to Prevent Relay Attacks
RFID systems suffer from different location-based attacks such as distance fraud, mafia fraud and terrorist fraud attacks. Among them mafia fraud attack is the most serious sin...
Chong Hee Kim, Gildas Avoine
ICCAD
2003
IEEE
129views Hardware» more  ICCAD 2003»
14 years 29 days ago
Performance Optimization of Latency Insensitive Systems Through Buffer Queue Sizing of Communication Channels
This paper proposes for latency insensitive systems a performance optimization technique called channel buffer queue sizing, which is performed after relay station insertion in th...
Ruibing Lu, Cheng-Kok Koh
INFOCOM
2007
IEEE
14 years 2 months ago
Cooperative Strategies and Optimal Scheduling for Tree Networks
Abstract— In this paper, we develop and analyze a lowcomplexity cooperative protocol that significantly increases the average throughput of multi-hop upstream transmissions for ...
Alexandre de Baynast, Omer Gurewitz, Edward W. Kni...
ICASSP
2008
IEEE
14 years 2 months ago
Outage capacity of a cooperative scheme with binary input and a simple relay
Cooperative communications is a rapidly evolving research area. Most of the cooperative protocols that have appeared in the literature assume slow flat fading channels and Gaussi...
George N. Karystinos, Athanasios P. Liavas
INFOCOM
2006
IEEE
14 years 1 months ago
Relay Placement for Higher Order Connectivity in Wireless Sensor Networks
Abstract— Sensors typically use wireless transmitters to communicate with each other. However, sensors may be located in a way that they cannot even form a connected network (e.g...
Abhishek Kashyap, Samir Khuller, Mark A. Shayman