Sciweavers

1256 search results - page 150 / 252
» A Simple E-Voting Protocol
Sort
View
NCA
2008
IEEE
15 years 11 months ago
Finite Memory: A Vulnerability of Intrusion-Tolerant Systems
In environments like the Internet, faults follow unusual patterns, dictated by the combination of malicious attacks with accidental faults such as long communication delays caused...
Giuliana Santos Veronese, Miguel Correia, Lau Cheu...
SECON
2008
IEEE
15 years 11 months ago
Topology Maintenance in Asynchronous Sensor Networks
Abstract— In most sensor networks the nodes are static. Nevertheless, the node connectivity is subject to changes because of disruptions in wireless connectivity, transmission po...
Reuven Cohen, Boris Kapchits
BROADNETS
2007
IEEE
15 years 11 months ago
Client-side web acceleration for low-bandwidth hosts
—Current popular web-browsers simply fetch the entire web-page from the server in a greedy fashion. This simple web fetching mechanism employed by browsers is inappropriate for u...
Tae-Young Chang, Zhenyun Zhuang, Aravind Velayutha...
GLOBECOM
2007
IEEE
15 years 11 months ago
Non-Coherent Detection for Amplify-and-Forward Relay Systems in a Rayleigh Fading Environment
— We consider about a multiple relay system operating under amplify-and-forward (AF) protocol and non-coherent modulation and demodulation. When the relays are under long-term po...
Yonglan Zhu, Pooi Yuen Kam, Yan Xin
ICC
2007
IEEE
101views Communications» more  ICC 2007»
15 years 10 months ago
On the Diversity-Multiplexing Tradeoff for Multi-Antenna Multi-Relay Channels
Abstract— In this paper we analyze the performance of multiple relay channels when multiple antennas are deployed only at relays. Specifically, we investigate the simple repetit...
Yijia Fan, John S. Thompson, Abdulkareem Adinoyi, ...