Sciweavers

435 search results - page 17 / 87
» Request-Driven GALS Technique for Wireless Communication Sys...
Sort
View
IPPS
2007
IEEE
14 years 2 months ago
Transaction Based Authentication Scheme for Mobile Communication: A Cognitive Agent Based Approach
The vulnerable air interface, device level constraints, and insecure encryption techniques of wireless networks have naturally increased the chance of attacker obtaining users inf...
B. Sathish Babu, Pallapa Venkataram
ICMCS
2000
IEEE
109views Multimedia» more  ICMCS 2000»
14 years 26 days ago
Source-Channel Matching Space-Time Diversity for Multimedia Communications
A source-channel matching space-time diversity technique is presented for reliable delivery of layer coded multimedia services through wireless channels. The transmission system i...
Haitao Zheng, K. J. Ray Liu
MSWIM
2005
ACM
14 years 2 months ago
Performance analysis of differentiated ARQ scheme for video transmission over wireless networks
The Advance in video coding and wireless communication techniques has enabled video-based services to be the most important component of many emerging multimedia applications. The...
Fen Hou, Pin-Han Ho, Yongbing Zhang
INFOCOM
2010
IEEE
13 years 7 months ago
Joint Power and Secret Key Queue Management for Delay Limited Secure Communication
—In recent years, the famous wiretap channel has been revisited by many researchers and information theoretic secrecy has become an active area of research in this setting. In th...
Onur Güngör 0002, Jian Tan, Can Emre Kok...
VTC
2007
IEEE
14 years 2 months ago
Time Slot Partitioning and Random Data Hopping for TDD Based Multihop Wireless Networks
Abstract— A multihop ad hoc wireless network with an interference avoidance model is analyzed for a time division duplex (TDD) air-interface. In accordance with the non-interfere...
Hrishikesh Venkataraman, Abdurazak Mudesir, Sinan ...