Sciweavers

1063 search results - page 166 / 213
» Capacity of steganographic channels
Sort
View
VTC
2007
IEEE
192views Communications» more  VTC 2007»
15 years 6 months ago
Access Scheduling Based on Time Water-Filling for Next Generation Wireless LANs
Opportunistic user access scheduling enhances the capacity of wireless networks by exploiting the multi user diversity. When frame aggregation is used, opportunistic schemes are no...
Ertugrul Necdet Ciftcioglu, Özgür Gü...
EOR
2008
100views more  EOR 2008»
14 years 12 months ago
Coordination of stocking decisions in an assemble-to-order environment
In this paper we study an assemble-to-order environment involving a short-life-cycle product. The product is sold in two different configurations, each requiring a unique componen...
Xiaohong Zhang, Jihong Ou, Stephen M. Gilbert
CORR
2007
Springer
176views Education» more  CORR 2007»
14 years 11 months ago
Crystallization in large wireless networks
—We analyze fading interference relay networks where M single-antenna source-destination terminal pairs communicate concurrently and in the same frequency band through a set of K...
Veniamin I. Morgenshtern, Helmut Bölcskei
ETT
2002
76views Education» more  ETT 2002»
14 years 11 months ago
Development and implementation of an advanced airport data link based on multi-carrier communications
In this paper, both the concept and the demonstrator implementation of an advanced airport data link is described which is used for data exchange between pilots and controllers in ...
Erik Haas, Helmuth Lang, Michael Schnell
TIT
2008
187views more  TIT 2008»
14 years 11 months ago
The Bare Bounded-Storage Model: The Tight Bound on the Storage Requirement for Key Agreement
Abstract--In the bounded-storage model (BSM) for information-theoretic secure encryption and key agreement, one makes use of a random string R whose length t is greater than the as...
Stefan Dziembowski, Ueli M. Maurer