Sciweavers

6031 search results - page 887 / 1207
» Communicating Transaction Processes
Sort
View
140
Voted
ICASSP
2011
IEEE
14 years 8 months ago
Cooperation strategies for secrecy in MIMO relay networks with unknown eavesdropper CSI
We investigate secure communications for a four-node relayeavesdropper channel with multiple data stream transmission, assuming that the eavesdropper’s channel state information...
Jing Huang, A. Lee Swindlehurst
ICASSP
2011
IEEE
14 years 8 months ago
Filter design with secrecy constraints: The multiple-input multiple-output Gaussian wiretap channel with zero forcing receive fi
This paper considers the problem of lter design with secrecy constraints, where two legitimate parties (Alice and Bob) communicate in the presence of an eavesdropper (Eve), over a...
Hugo Reboredo, Vinay Uday Prabhu, Miguel R. D. Rod...
ICASSP
2011
IEEE
14 years 8 months ago
Application control for fast adaptive error resilient H.264/AVC streaming over IP wireless networks
Following the joint source and channel coding paradigm, we propose in this article an application controlling strategy to allow fast adaptation of multimedia transmission to the i...
Catherine Lamy-Bergot, Benjamin Gadat
147
Voted
ICASSP
2011
IEEE
14 years 8 months ago
Performance evaluation of Raptor and Random Linear Codes for H.264/AVC video transmission over DVB-H networks
Application Layer Forward Error Correction (AL)-FEC is increasingly being employed in the emerging wireless multimedia applications, where the multimedia data is sent along with r...
Sajid Nazir, Dejan Vukobratovic, Vladimir Stankovi...
ICASSP
2011
IEEE
14 years 8 months ago
Vulnerability of insens to denial of service attacks
Wireless Sensor Networks (WSNs) may be deployed in hostile or inaccessible environments and are often unattended. In these conditions securing a WSN against malicious attacks is a...
Kashif Saghar, David Kendall, Ahmed Bouridane