Sciweavers

448 search results - page 76 / 90
» k-anonymous message transmission
Sort
View
TWC
2008
129views more  TWC 2008»
13 years 7 months ago
Lifetime maximization for amplify-and-forward cooperative networks
Power allocation strategies are devised to maximize the network lifetime of amplify-and-forward (AF) cooperative networks in this work. We consider the scenario where one source an...
Wan-Jen Huang, Yao-Win Peter Hong, C. C. Jay Kuo
COMCOM
2007
145views more  COMCOM 2007»
13 years 7 months ago
Jointly rate and power control in contention based MultiHop Wireless Networks
This paper presents a new algorithm for jointly optimal control of session rate, link attempt rate, and link power in contention based MultiHop Wireless Networks. Formulating the ...
Abdorasoul Ghasemi, Karim Faez
TON
2002
175views more  TON 2002»
13 years 7 months ago
Compressed bloom filters
A Bloom filter is a simple space-efficient randomized data structure for representing a set in order to support membership queries. Although Bloom filters allow false positives, f...
Michael Mitzenmacher
CORR
2010
Springer
133views Education» more  CORR 2010»
13 years 6 months ago
Robust Beamforming for Security in MIMO Wiretap Channels with Imperfect CSI
—In this paper, we investigate methods for reducing the likelihood that a message transmitted between two multiantenna nodes is intercepted by an undetected eavesdropper. In part...
Amitav Mukherjee, A. Lee Swindlehurst
INFOCOM
2010
IEEE
13 years 5 months ago
RIPPLE Authentication for Network Coding
Abstract—By allowing routers to randomly mix the information content in packets before forwarding them, network coding can maximize network throughput in a distributed manner wit...
Yaping Li, Hongyi Yao, Minghua Chen, Sidharth Jagg...