Sciweavers

146 search results - page 18 / 30
» Supporting multiple protection strategies in optical network...
Sort
View
INFOCOM
2006
IEEE
14 years 1 months ago
Session Privacy Enhancement by Traffic Dispersion
— Traditional network routing uses the single (shortest) path paradigm. This paradigm leaves the session vulnerable to a variety of security threats, such as eavesdropping. We pr...
Haim Zlatokrilov, Hanoch Levy
AINA
2008
IEEE
14 years 2 months ago
Adaptive QoS-Aware Resource Management in Heterogeneous Wireless Networks
The integration of different IP-based wireless networks, such as WiMAX and WiFi, becomes a 2-tier heterogeneous wireless networks is a more and more popular issue. In order to supp...
I-Shyan Hwang, Bor-Jiunn Hwang, K. Robert Lai, Lin...
ECCV
2010
Springer
14 years 3 days ago
Analyzing Depth from Coded Aperture Sets
Computational depth estimation is a central task in computer vision and graphics. A large variety of strategies have been introduced in the past relying on viewpoint variations, de...
TSP
2008
119views more  TSP 2008»
13 years 7 months ago
MIMO Relaying With Linear Processing for Multiuser Transmission in Fixed Relay Networks
In this paper, a novel relaying strategy that uses multiple input multiple output (MIMO) fixed relays with linear processing to support multiuser transmission in cellular networks...
Chan-Byoung Chae, Taiwen Tang, Robert W. Heath Jr....
VTC
2008
IEEE
112views Communications» more  VTC 2008»
14 years 2 months ago
Theoretical Analysis of Saturation Throughput in MU-DCF
Abstract—In this paper, the calculation of saturation throughput for previously proposed Multi-User - Distributed Coordination Function (MU-DCF) is presented. MU-DCF is an IEEE 8...
Jelena Mirkovic, Bernhard Walke