Broadcast among n parties in the presence of t ≥ n/3 malicious parties is possible only with some additional setup. The most common setup considered is the existence of a PKI an...
Juan A. Garay, Jonathan Katz, Chiu-Yuen Koo, Rafai...
— This paper explores relay selection and selection diversity for coded cooperation in wireless sensor networks, with complexity constraints for the sensor nodes. In previous wor...
Josephine P. K. Chu, Raviraj S. Adve, Andrew W. Ec...
Visualization as a communication medium is an important factor when considering how individuals are influenced in a decision about a complex policy issue. Age, race and gender may...
Deirdre Hahn, Rick Shangraw, Mark Keith, David H. ...
— Forward Error Correction (FEC) schemes are generally used in wireless communication systems to maintain an acceptable quality of service. Various models have been proposed in l...
— An interferometric ranging technique has been recently proposed as a possible way to localize ad hoc and sensor networks. Compared to the more common techniques such as receive...