Sciweavers

2880 search results - page 498 / 576
» Using Channels for Multimedia Communication
Sort
View
ISADS
1999
IEEE
14 years 2 months ago
A Secure Key Registration System based on Proactive Secret-Sharing Scheme
We designed a secure key registration system based on the proactive secret-sharing scheme. A user can register important data such as a session key to a distributed system in a (t...
Masayuki Numao
IMC
2007
ACM
13 years 11 months ago
Studying wireless routing link metric dynamics
Multi-hop wireless mesh networks are increasingly being deployed for last-mile Internet access. Typically, network algorithms such as routing, channel assignment and topology cont...
Saumitra M. Das, Himabindu Pucha, Konstantina Papa...
PDPTA
2003
13 years 11 months ago
The Performance of Routing Algorithms under Bursty Traffic Loads
Routing algorithms are traditionally evaluated under Poisson-like traffic distributions. This type of traffic is smooth over large time intervals and has been shown not necessaril...
Jeonghee Shin, Timothy Mark Pinkston
CORR
2007
Springer
176views Education» more  CORR 2007»
13 years 10 months ago
Crystallization in large wireless networks
—We analyze fading interference relay networks where M single-antenna source-destination terminal pairs communicate concurrently and in the same frequency band through a set of K...
Veniamin I. Morgenshtern, Helmut Bölcskei
TSP
2008
76views more  TSP 2008»
13 years 10 months ago
Minimum Mean-Square Error Equalization for Second-Order Volterra Systems
In this paper, a novel nonlinear Volterra equalizer is presented. We define a framework for nonlinear second-order Volterra models, which is applicable to different applications in...
Christoph Krall, Klaus Witrisal, Geert Leus, Heinz...