Sciweavers

ICC
2009
IEEE
155views Communications» more  ICC 2009»
13 years 6 months ago
On Hashing with Tweakable Ciphers
Cryptographic hash functions are often built on block ciphers in order to reduce the security of the hash to that of the cipher, and to minimize the hardware size. Proven secure co...
Raphael Chung-Wei Phan, Jean-Philippe Aumasson
ICC
2009
IEEE
135views Communications» more  ICC 2009»
13 years 6 months ago
Load Aware Broadcast in Mobile Ad Hoc Networks
In a wireless ad hoc network, the main issue of a good broadcast protocol is to attain maximum reachability with minimal packet forwarding. Existing protocols address this issue by...
Md. Tanvir Al Amin, Sukarna Barua, Sudip Vhaduri, ...
ICC
2009
IEEE
164views Communications» more  ICC 2009»
13 years 6 months ago
Static Analysis of Executables for Collaborative Malware Detection on Android
Smartphones are getting increasingly popular and several malwares appeared targeting these devices. General countermeasures to smartphone malwares are currently limited to signatur...
Aubrey-Derrick Schmidt, Rainer Bye, Hans-Gunther S...
ICC
2009
IEEE
116views Communications» more  ICC 2009»
13 years 6 months ago
Efficient Implementation of Binary Sequence Generator for WiMAX and WRAN on Programmable Digital Signal Processor
In this paper, an efficient design for implementing binary sequence generator on 32-bit instruction execution mode TI TMS320C6416 DSP is presented. The main goal is to achieve high...
Lok Tiing Tie, Ser Wah Oh, K. J. M. Kua
ICC
2009
IEEE
107views Communications» more  ICC 2009»
13 years 6 months ago
Evaluation of Link Protection Schemes in Physically Impaired Optical Networks
Link protection schemes for WDM-based optical networks have been extensively researched. Most work to date has ignored the physical layer impairments (PLIs) that could be dominant ...
Amir Askarian, Suresh Subramaniam, Maït&eacut...
ICC
2009
IEEE
150views Communications» more  ICC 2009»
13 years 6 months ago
Interference-Aware Channel Assignments with Seamless Multi-Channel Monitoring in Wireless Mesh Networks
The wireless mesh networks (WMNs) are statically deployed on heterogeneous areas and are operating in open wireless media, and thus it coexists with other networks operating on the...
Sunghun Kim 0002, Jongsub Cha, Joongsoo Ma
ICC
2009
IEEE
13 years 6 months ago
Optimal Transmitters for Hypothesis Testing over a Rayleigh Fading MAC
We consider the case when K sensors have strongly correlated measurements - they all observe a 0 or they all observe
Onkar Dabeer
ICC
2009
IEEE
114views Communications» more  ICC 2009»
13 years 6 months ago
Energy Efficiency of Fixed-Rate Wireless Transmissions under QoS Constraints
1 Transmission over wireless fading channels under quality of service (QoS) constraints is studied when only the receiver has perfect channel side information. Being unaware of the...
Deli Qiao, Mustafa Cenk Gursoy, Senem Velipasalar
ICC
2009
IEEE
140views Communications» more  ICC 2009»
13 years 6 months ago
Approximation Algorithms for Traffic Grooming in WDM Rings
Abstract-- This paper addresses the problem of traffic grooming in WDM rings in which all traffic emanates from a single node and all other nodes are destination nodes. This "...
Kevin Corcoran, Seth Flaxman, Mark Neyer, Peter Sc...
ICC
2009
IEEE
130views Communications» more  ICC 2009»
13 years 6 months ago
User Profiling: A Method for Limited Feedback in OFDMA Systems
In the OFDMA downlink, obtaining Channel State Information (CSI) from users is necessary for the Base Station (BS) to optimize network performance by intelligently allocating resou...
Vinay R. Majjigi, Rajiv Agarwal, John M. Cioffi