Sciweavers

1462 search results - page 73 / 293
» The Abstract MAC Layer
Sort
View
FSE
2006
Springer
132views Cryptology» more  FSE 2006»
14 years 1 months ago
New Blockcipher Modes of Operation with Beyond the Birthday Bound Security
In this paper, we define and analyze a new blockcipher mode of operation for encryption, CENC, which stands for Cipher-based ENCryption. CENC has the following advantages: (1) bey...
Tetsu Iwata
WINET
2008
81views more  WINET 2008»
13 years 10 months ago
Interference power statistics in ad-hoc and sensor networks
Abstract There exist accurate calculation methods for estimation of interference power sum statistics in fixedtopology wireless networks based on the log-normal shadowing radio mod...
Ramin Hekmat, Piet Van Mieghem
GLOBECOM
2007
IEEE
14 years 4 months ago
Stability Emphasizing Cross-Layer Optimization of Transmit Power Allocation in Distributed Wireless Networks
Abstract— This paper theoretically analyzes cross-layer optimized design of transmit power allocation in distributed interference-limited wireless networks with asynchronously ac...
Stepán Kucera, Sonia Aïssa, Susumu Yos...
INFOCOM
2007
IEEE
14 years 4 months ago
Who Said That? Privacy at Link Layer
Abstract— Wireless LAN and other radio broadcast technologies are now in full swing. However, the widespread usage of these technologies comes at the price of location privacy, b...
Frederik Armknecht, Joao Girão, Alfredo Mat...
CVIU
2004
132views more  CVIU 2004»
13 years 9 months ago
Layered representations for learning and inferring office activity from multiple sensory channels
We present the use of layered probabilistic representations for modeling human activities, and describe how we use the representation to do sensing, learning, and inference at mul...
Nuria Oliver, Ashutosh Garg, Eric Horvitz