Sciweavers

16 search results - page 3 / 4
» Wireless Information-Theoretic Security - Part I: Theoretica...
Sort
View
CN
2004
122views more  CN 2004»
13 years 5 months ago
Explicit transport error notification (ETEN) for error-prone wireless and satellite networks
This paper is a summary of the BBN Technical Report No. 8333, "Explicit Transport Error Notification for Error-Prone Wireless and Satellite Networks." In this study we di...
Rajesh Krishnan, James P. G. Sterbenz, Wesley M. E...
ACMSE
2005
ACM
13 years 11 months ago
On developing a simple in-house digital library archive
Digital libraries (DLs) have become a major focus of information technology resources for organizations from academia, to the US Department of Defense to the archeological efforts...
Eric L. Brown, Luis G. Velazco, G. Kirksey, S. Ram...
MSWIM
2004
ACM
13 years 11 months ago
On utility-based radio resource management with and without service guarantees
In this paper we discuss utility functions models to study Radio Resource Management. Our goal is to identify the characteristics of the wireless systems which make such theoretic...
Leonardo Badia, Michele Zorzi
GECCO
2008
Springer
179views Optimization» more  GECCO 2008»
13 years 6 months ago
Emergent architecture in self organized swarm systems for military applications
Many sectors of the military are interested in Self-Organized (SO) systems because of their flexibility, versatility and economics. The military is researching and employing auto...
Dustin J. Nowak, Gary B. Lamont, Gilbert L. Peters...
CORR
2010
Springer
147views Education» more  CORR 2010»
13 years 5 months ago
Distributed Storage Codes Meet Multiple-Access Wiretap Channels
We consider i) the overhead minimization of maximum-distance seperable (MDS) storage codes for the repair of a single failed node and ii) the total secure degrees-of-freedom (S-DoF...
Dimitris S. Papailiopoulos, Alexandros G. Dimakis