Sciweavers

2507 search results - page 466 / 502
» Wireless Network Information Flow
Sort
View
PERCOM
2009
ACM
14 years 2 months ago
Concurrent Event Detection for Asynchronous Consistency Checking of Pervasive Context
—Contexts, the pieces of information that capture the characteristics of computing environments, are often inconsistent in the dynamic and uncertain pervasive computing environme...
Yu Huang 0002, Xiaoxing Ma, Jiannong Cao, XianPing...
CSE
2009
IEEE
14 years 2 months ago
Privacy Requirements in Vehicular Communication Systems
Abstract—A primary goal of vehicular communication systems is the enhancement of traffic safety by equipping vehicles with wireless communication units to facilitate cooperative...
Florian Schaub, Zhendong Ma, Frank Kargl
INFOCOM
2009
IEEE
14 years 2 months ago
Greedy Routing with Bounded Stretch
—Greedy routing is a novel routing paradigm where messages are always forwarded to the neighbor that is closest to the destination. Our main result is a polynomial-time algorithm...
Roland Flury, Sriram V. Pemmaraju, Roger Wattenhof...
WOWMOM
2009
ACM
146views Multimedia» more  WOWMOM 2009»
14 years 2 months ago
Optimization of WiMax modulation scheme with a cross layer erasure code
WIMAX (Worldwide Interoperability for Microwave Access) is a promising new networking technology that potentially offers high speed and wide area wireless access services that com...
Lei Zhang, Patrick Sénac, Roksana Boreli, M...
WCNC
2008
IEEE
14 years 2 months ago
Genetic Algorithm Aided Design of Near-Capacity Irregular Variable Length Codes
— In this paper we demonstrate that our ability to match the EXtrinsic Information Transfer (EXIT) function of an Irregular Variable Length Code (IrVLC) to that of a seriallyconc...
Robert G. Maunder, Lajos Hanzo