Sciweavers

85 search results - page 16 / 17
» Belief Updating by Communication Channel
Sort
View
ISADS
1999
IEEE
13 years 9 months ago
A Secure Key Registration System based on Proactive Secret-Sharing Scheme
We designed a secure key registration system based on the proactive secret-sharing scheme. A user can register important data such as a session key to a distributed system in a (t...
Masayuki Numao
ICECCS
1997
IEEE
97views Hardware» more  ICECCS 1997»
13 years 9 months ago
A Synthesis Method for Fault-tolerant and Flexible Multipath Routing Protocols
Design of practical routing protocols is complex and dificult due to complicated requirements of faulttolerance and flexibility. The protocol is defined to be fault-tolerant if me...
Yutaka Hatanaka, Masahide Nakamura, Yoshiaki Kakud...
IAJIT
2010
141views more  IAJIT 2010»
13 years 3 months ago
Complex Gain Predistortion in WCDMA Power Amplifiers with Memory Effects
: Power amplifiers are essential components in communication systems and are inherently nonlinear. The nonlinearity creates spectral growth beyond the signal bandwidth, which inter...
Pooria Varahram, Somayeh Mohammady, Mohd Hamidon, ...
INFOCOM
2009
IEEE
13 years 12 months ago
Rateless Coding with Feedback
The erasure resilience of rateless codes, such as Luby-Transform (LT) codes, makes them particularly suitable to a wide variety of loss-prone wireless and sensor network applicati...
Andrew Hagedorn, Sachin Agarwal, David Starobinski...
MOBIHOC
2005
ACM
14 years 4 months ago
Temporal properties of low power wireless links: modeling and implications on multi-hop routing
Recently, several studies have analyzed the statistical properties of low power wireless links in real environments, clearly demonstrating the differences between experimentally o...
Alberto Cerpa, Jennifer L. Wong, Miodrag Potkonjak...