Sciweavers

519 search results - page 48 / 104
» Adaptive relay selection in cooperative wireless networks
Sort
View
CORR
2007
Springer
124views Education» more  CORR 2007»
14 years 9 months ago
Anonymous Networking amidst Eavesdroppers
—The problem of security against packet timing based traffic analysis in wireless networks is considered in this work. An analytical measure of “anonymity” of routes in eave...
Parvathinathan Venkitasubramaniam, Ting He, Lang T...
ADHOCNOW
2004
Springer
15 years 3 months ago
Weathering the Storm: Managing Redundancy and Security in Ad Hoc Networks
Many ad hoc routing algorithms rely on broadcast flooding for location discovery or more generally for secure routing applications, particularly when dealing with Byzantine threat...
Mike Burmester, Tri Van Le, Alec Yasinsac
CCECE
2009
IEEE
15 years 2 months ago
Capacity analysis of a decode-and-forward cooperative network under adaptive transmission
—This paper presents a capacity analysis of a decode-and-forward (DF) cooperative network with adaptive source transmission. Three different adaptive techniques are considered: (...
Prasanna Kalansuriya, Chintha Tellambura
ICDCS
2008
IEEE
15 years 4 months ago
Utility-Based Opportunistic Routing in Multi-Hop Wireless Networks
—Recently, opportunistic routing (OR) has been widely used to compensate for the low packet delivery ratio of multi-hop wireless networks. Previous works either provide heuristic...
Jie Wu, Mingming Lu, Feng Li
CORR
2007
Springer
158views Education» more  CORR 2007»
14 years 9 months ago
Multi-group ML Decodable Collocated and Distributed Space Time Block Codes
Abstract— In this paper, collocated and distributed spacetime block codes (DSTBCs) which admit multi-group maximum likelihood (ML) decoding are studied. First the collocated case...
G. Susinder Rajan, B. Sundar Rajan