Sciweavers

2392 search results - page 393 / 479
» Channel-Hopping Multiple Access
Sort
View
TCC
2007
Springer
114views Cryptology» more  TCC 2007»
15 years 6 months ago
Multi-authority Attribute Based Encryption
Abstract. In an identity based encryption scheme, each user is identified by a unique identity string. An attribute based encryption scheme (ABE), in contrast, is a scheme in whic...
Melissa Chase
CNSR
2006
IEEE
132views Communications» more  CNSR 2006»
15 years 6 months ago
SCTP Multihoming Support for Handoffs across Heterogeneous Networks
Next-generation mobile terminals are expected to provide users with seamless, uninterrupted network connectivity while moving across wide geographic locations. Achieving continuou...
Farhan Siddiqui, Sherali Zeadally
DATE
2006
IEEE
93views Hardware» more  DATE 2006»
15 years 6 months ago
Restructuring field layouts for embedded memory systems
In many computer systems with large data computations, the delay of memory access is one of the major performance bottlenecks. In this paper, we propose an enhanced field remappi...
Keoncheol Shin, Jungeun Kim, Seonggun Kim, Hwansoo...
GLOBECOM
2006
IEEE
15 years 6 months ago
Frequency Offset Estimation for IFDMA Uplink Systems
— This paper proposes two frequency offset estimation algorithms for the uplink of an Interleaved Frequency-Division Multiple-Access (IFDMA) system. One algorithm performs estima...
Alexander Arkhipov, Michael Schnell
GLOBECOM
2006
IEEE
15 years 6 months ago
Bayesian Data Fusion for Asynchronous DS-CDMA Sensor Networks in Rayleigh Fading
Abstract— In this paper, we propose asynchronous non-orthogonal communication between distributed sensors and a data fusion center via asynchronous direct-sequence code-division ...
Justin S. Dyer, Balasubramaniam Natarajan, Sudharm...