Sciweavers

ICC
2008
IEEE
126views Communications» more  ICC 2008»
14 years 6 months ago
Network Coding for Two-Way Relaying: Rate Region, Sum Rate and Opportunistic Scheduling
—Network coding for two-way relaying in a three-node network is considered. The achievable rate regions under both traditional four-slot multi-hopping (FSMH) and network coding (...
Chun-Hung Liu, Feng Xue
ICC
2008
IEEE
141views Communications» more  ICC 2008»
14 years 6 months ago
Multilevel Structured Low-Density Parity-Check Codes
— Low-Density Parity-Check (LDPC) codes are typically characterized by a relatively high-complexity description, since a considerable amount of memory is required in order to sto...
Nicholas Bonello, Sheng Chen, Lajos Hanzo
ICC
2008
IEEE
121views Communications» more  ICC 2008»
14 years 6 months ago
Performance of ALOHA and CSMA in Spatially Distributed Wireless Networks
—In this paper the performance of unslotted ALOHA and CSMA are analyzed in spatially distributed wireless networks. Users/packets arrive randomly in space and time according to a...
Mariam Kaynia, Nihar Jindal
ICC
2008
IEEE
161views Communications» more  ICC 2008»
14 years 6 months ago
Multidimensional Layered Forward Error Correction Using Rateless Codes
Abstract— Modern layered or scalable video coding technologies generate a video bit stream with various inter layer dependencies due to references between the layers. This work p...
Cornelius Hellge, Thomas Schierl, Thomas Wiegand
ICC
2008
IEEE
167views Communications» more  ICC 2008»
14 years 6 months ago
Traceroute-Based Topology Inference without Network Coordinate Estimation
Abstract— Underlay topology information is important to construct efficient overlay networks. To achieve end-to-end network topology inference among a group of hosts, traceroute...
Xing Jin, Wanqing Tu, S.-H. Gary Chan
ICC
2008
IEEE
176views Communications» more  ICC 2008»
14 years 6 months ago
A k-Nearest Neighbor Approach for User Authentication through Biometric Keystroke Dynamics
— Keystroke dynamics exhibit people’s behavioral features which are similar to hand signatures. A major problem hindering the large scale deployment of this technology is its h...
Jiankun Hu, Don Gingrich, Andy Sentosa
ICC
2008
IEEE
163views Communications» more  ICC 2008»
14 years 6 months ago
A New Replay Attack Against Anonymous Communication Networks
Abstract— Tor is a real-world, circuit-based low-latency anonymous communication network, supporting TCP applications on the Internet. In this paper, we present a new class of at...
Ryan Pries, Wei Yu, Xinwen Fu, Wei Zhao
ICC
2008
IEEE
143views Communications» more  ICC 2008»
14 years 6 months ago
A Closed-Form Expression for Static Worm-Scanning Strategies
—This work presents a closed-form expression for characterizing the spread of static worm-scanning strategies through a mean-field approximation. Our model can both accurately c...
Zesheng Chen, Chao Chen
ICC
2008
IEEE
118views Communications» more  ICC 2008»
14 years 6 months ago
Optimal Quality-of-Experience Design for a P2P Multi-Source Video Streaming
—We consider the design of a P2P network for the distribution of real-time video streams through the Internet. We follow a multi-source approach where the stream is decomposed in...
Ana Paula Couto da Silva, Pablo Rodríguez-B...