Sciweavers

17932 search results - page 3522 / 3587
» Wireless communications systems
Sort
View
P2P
2008
IEEE
15 years 10 months ago
Peer-to-Peer Secure Multi-party Numerical Computation
We propose an efficient framework for enabling secure multi-party numerical computations in a Peer-to-Peer network. This problem arises in a range of applications such as collabo...
Danny Bickson, Danny Dolev, Genia Bezman, Benny Pi...
TRIDENTCOM
2008
IEEE
15 years 10 months ago
Empirical evaluation of VoIP aggregation over a fixed WiMAX testbed
The WiMAX Reference Network Architecture can be used in point-to-point and point-to-multipoint network topologies, and is suitable for providing last-mile, building-to-building, a...
Kostas Pentikousis, Esa Piri, Jarno Pinola, Frerk ...
WIMOB
2008
IEEE
15 years 10 months ago
A Moderate to Robust Game Theoretical Model for Intrusion Detection in MANETs
—One popular solution for reducing the resource consumption of Intrusion Detection System (IDS) in MANET is to elect a head-cluster (leader) to provide intrusion detection servic...
Hadi Otrok, Noman Mohammed, Lingyu Wang, Mourad De...
127
Voted
GLOBECOM
2007
IEEE
15 years 10 months ago
Beamforming with Limited Feedback in Amplify-and-Forward Cooperative Networks
— A relay selection approach has previously been shown to outperform repetition-based scheduling for both amplify-and-forward (AF) and decode-and-forward (DF) cooperative network...
Yi Zhao, Raviraj Adve, Teng Joon Lim
GLOBECOM
2007
IEEE
15 years 10 months ago
Degrees of Freedom of the MIMO X Channel
— We provide achievability as well as converse results for the degrees of freedom region of a MIMO X channel, i.e., a system with two transmitters, two receivers, each equipped w...
Syed Ali Jafar, Shlomo Shamai
« Prev « First page 3522 / 3587 Last » Next »