Sciweavers

45 search results - page 5 / 9
» cic 2008
Sort
View
CIC
2006
103views Communications» more  CIC 2006»
14 years 8 days ago
Performance Analysis of Punctured Turbo Code under An AWGN Channel
Turbo code is a coding technique that enhances a reliable data transmission. Because of special structure of encoder and iterative decoder, it could obtain 1dB at low EbN0 db that...
Ya-Fen Chen, Cheng-Ying Yang
CIC
2006
114views Communications» more  CIC 2006»
14 years 8 days ago
Tree Based Conference Key Establishment Cost Analysis and Minimization in Heterogeneous Networks
A shared secret, conference key, must be established among members to securely communicate among them. The Diffie-Hellman is often used for the conference key establishment. In a ...
Zhan Liu, Mi Lu
CIC
2006
124views Communications» more  CIC 2006»
14 years 8 days ago
Chaotic Systems Synchronization in Secure Communication Systems
In this paper, synchronization of two chaotic signals is studied and analyzed. A nonlinear recursive backstepping scheme is utilized to design an appropriate control input signal ...
Ahmad Harb, Wajdi Ahmad
CIC
2006
124views Communications» more  CIC 2006»
14 years 8 days ago
Comments on the Channel Capacity of Ethernet
Ethernet is the most widely used network and many analytical models were developed to predict its capacity. Usually in these models assumptions like infinite population, no back-of...
Maher Heal
CIC
2006
102views Communications» more  CIC 2006»
14 years 8 days ago
On-line Algorithm for Server Selection of Video Streaming over P2P Networks
We consider a video streaming application over P2P networks and introduce the P2P on-line server selection problem. This task is related to the classic K-server problem, known fro...
Hao Wang, Andras Farago