Sciweavers

2507 search results - page 422 / 502
» Wireless Network Information Flow
Sort
View
PERCOM
2006
ACM
14 years 7 months ago
Context and Location-Aware Encryption for Pervasive Computing Environments
Pervasive computing promises to revolutionize computing, empower mobile users, and enhance mobility, customizability and adaptability of computing environments. Intrinsic to the n...
Jalal Al-Muhtadi, Raquel L. Hill, Roy H. Campbell,...
ICC
2009
IEEE
135views Communications» more  ICC 2009»
13 years 5 months ago
Adaptive Compress-and-Forward Relaying in Fading Environments with or without Wyner-Ziv Coding
Abstract--Compress-and-Forward is a protocol for transmission over relay networks in which the relay forwards a compressed version of the signal it observes. The compression method...
Harold H. Sneessens, Luc Vandendorpe, J. Nicholas ...
CHI
2006
ACM
14 years 8 months ago
Urbanhermes: social signaling with electronic fashion
Fashion signals are displayed to indicate access to information. Consistent, timely, and meaningful signal displays are only made possible if one is well-connected. While fashion ...
Christine M. Liu, Judith S. Donath
CISS
2008
IEEE
14 years 2 months ago
Revisiting the optimal scheduling problem
— In this paper, we revisit the problem of determining the minimum-length schedule that satisfies certain traffic demands in a wireless network. Traditional approaches for the ...
Sastry Kompella, Jeffrey E. Wieselthier, Anthony E...
IAW
2003
IEEE
14 years 1 months ago
An Evolutionary Approach to Generate Fuzzy Anomaly Signatures
Abstract— This paper describes the generation of fuzzy signatures to detect some cyber attacks. This approach is an enhancement to our previous work, which was based on the princ...
Fabio A. González, Jonatan Gómez, Ma...