Sciweavers

30 search results - page 4 / 6
» cic 2006
Sort
View
CIC
2006
114views Communications» more  CIC 2006»
13 years 8 months ago
Tree Based Conference Key Establishment Cost Analysis and Minimization in Heterogeneous Networks
A shared secret, conference key, must be established among members to securely communicate among them. The Diffie-Hellman is often used for the conference key establishment. In a ...
Zhan Liu, Mi Lu
CIC
2006
103views Communications» more  CIC 2006»
13 years 8 months ago
Performance Analysis of Punctured Turbo Code under An AWGN Channel
Turbo code is a coding technique that enhances a reliable data transmission. Because of special structure of encoder and iterative decoder, it could obtain 1dB at low EbN0 db that...
Ya-Fen Chen, Cheng-Ying Yang
CIC
2006
102views Communications» more  CIC 2006»
13 years 8 months ago
On-line Algorithm for Server Selection of Video Streaming over P2P Networks
We consider a video streaming application over P2P networks and introduce the P2P on-line server selection problem. This task is related to the classic K-server problem, known fro...
Hao Wang, Andras Farago
CIC
2006
141views Communications» more  CIC 2006»
13 years 8 months ago
Towards the Integration of Reliability and Traffic Engineering
The main goal of this paper is to make a step towards the development of a unified approach that incorporates both reliability and traffic engineering aspects into a common, unifie...
Andras Farago
CIC
2006
184views Communications» more  CIC 2006»
13 years 8 months ago
A Data Replication Scheme based on Primary Copy for Ensuring Data Consistency in Mobile Ad hoc Networks
Abstract - A mobile ad hoc network (MANET) is a multihop wireless network capable of autonomous operations. Since MANET causes frequent network partitions, a data replication is co...
Aekyung Moon, Han Namgoong, Hyoungsun Kim, Hyun Ki...