Sciweavers

85 search results - page 2 / 17
» Investigation of Signal and Message Manipulations on the Wir...
Sort
View
ICC
2007
IEEE
129views Communications» more  ICC 2007»
13 years 11 months ago
Closed-Form Expressions for the Outage and Error Probabilities of Decode-and-Forward Relaying in Dissimilar Rayleigh Fading Chan
—User cooperation protocols, where mobile stations relay signals to the final destination, have been proposed for wireless networks. A general mathematical probability model is ...
Jeremiah Hu, Norman C. Beaulieu
MMNS
2001
151views Multimedia» more  MMNS 2001»
13 years 6 months ago
Analysis of Random Access Protocol under Bursty Traffic
Aloha-type random-access protocols have been employed as access control protocols in wireline and wireless, stationary and mobile, multiple-access communications networks. They are...
Jianbo Gao, Izhak Rubin
INFOCOM
2009
IEEE
13 years 11 months ago
On Cooperative Wireless Network Secrecy
—Given that wireless communication occurs in a shared and inherently broadcast medium, the transmissions are vulnerable to undesired eavesdropping. This occurs even when a point-...
Etienne Perron, Suhas N. Diggavi, Emre Telatar
EWSN
2012
Springer
12 years 15 days ago
On the Optimal Blacklisting Threshold for Link Selection in Wireless Sensor Networks
Empirical studies on link blacklisting show that the delivery rate is very sensitive to the calibration of the blacklisting threshold. If the calibration is too restrictive (the th...
Flavio Fabbri, Marco Zuniga, Daniele Puccinelli, P...
ICASSP
2011
IEEE
12 years 8 months ago
Joint source-channel-network coding for bidirectional wireless relays
The application of joint source-channel coding, based on fountain codes, in the broadcast timeslot of wireless two-way network coding is investigated in this paper. A computationa...
Francois P. S. Luus, Bodhaswar T. Maharaj