Sciweavers

849 search results - page 39 / 170
» Completely Non-malleable Schemes
Sort
View
TIT
2002
95views more  TIT 2002»
14 years 9 months ago
Opportunistic beamforming using dumb antennas
Multiuser diversity is a form of diversity inherent in a wireless network, provided by independent time-varying channels across the different users. The diversity benefit is exploi...
Pramod Viswanath, David N. C. Tse, Rajiv Laroia
JCM
2010
126views more  JCM 2010»
14 years 8 months ago
Adding Redundancy to Replication in Window-aware Delay-tolerant Routing
— This paper presents a resource-efficient protocol for opportunistic routing in delay-tolerant networks (DTN). First, our approach exploits the context of mobile nodes (speed, ...
Gabriel Sandulescu, Simin Nadjm-Tehrani
INFOCOM
2012
IEEE
13 years 5 days ago
BitTrickle: Defending against broadband and high-power reactive jamming attacks
—Reactive jamming is not only cost effective, but also hard to track and remove due to its intermittent jamming behaviors. Frequency Hopping Spread Spectrum (FHSS) and Direct Seq...
Yao Liu, Peng Ning
ICCV
2005
IEEE
15 years 3 months ago
A Unifying Approach to Hard and Probabilistic Clustering
We derive the clustering problem from first principles showing that the goal of achieving a probabilistic, or ”hard”, multi class clustering result is equivalent to the algeb...
Ron Zass, Amnon Shashua
SCN
2008
Springer
105views Communications» more  SCN 2008»
14 years 9 months ago
Expressive Subgroup Signatures
In this work, we propose a new generalization of the notion of group signatures, that allows signers to cover the entire spectrum from complete disclosure to complete anonymity. Pr...
Xavier Boyen, Cécile Delerablée