Sciweavers

848 search results - page 119 / 170
» Topology Control
Sort
View
CORR
2010
Springer
110views Education» more  CORR 2010»
13 years 8 months ago
(Unconditional) Secure Multiparty Computation with Man-in-the-middle Attacks
In secure multi-party computation n parties jointly evaluate an n-variate function f in the presence of an adversary which can corrupt up till t parties. All honest parties are req...
Shailesh Vaya
ICMCS
2007
IEEE
76views Multimedia» more  ICMCS 2007»
14 years 2 months ago
Multi-Party Audio Conferencing Based on a Simpler MCU and Client-Side ECHO Cancellation
Traditional multiparty audio conferencing uses a star-shaped topology where all the clients connect to a central MCU (Multipoint Control Unit). The MCU mixes the signals from the ...
Junlin Li, Li-wei He, Dinei A. F. Florêncio
INFOCOM
2007
IEEE
14 years 2 months ago
Joint Channel Allocation, Interface Assignment and MAC Design for Multi-Channel Wireless Mesh Networks
— In a wireless mesh network (WMN) with a number of stationary wireless routers, the aggregate capacity can be increased when each router is equipped with multiple network interf...
Amir Hamed Mohsenian Rad, Vincent W. S. Wong
IWDC
2004
Springer
161views Communications» more  IWDC 2004»
14 years 1 months ago
Distributed Mobility Tracking for Ad Hoc Networks Based on an Autoregressive Model
Abstract. In ad hoc networks, node mobility causes the network topology to change dynamically over time, which complicates important tasks such as routing and flow control. We pro...
Zainab R. Zaidi, Brian L. Mark
SSD
1997
Springer
154views Database» more  SSD 1997»
14 years 3 days ago
On the Assessment of Generalisation Consistency
Theory, algorithms, techniques and tools for producing a generalisation of a map have long been available. In this paper we study the inverse problem, namely, given two maps L and...
Vasilis Delis, Thanasis Hadzilacos