Sciweavers

332 search results - page 49 / 67
» Cooperative Relay Networks Using Fountain Codes
Sort
View
CORR
2010
Springer
184views Education» more  CORR 2010»
14 years 9 months ago
Strong Secrecy and Reliable Byzantine Detection in the Presence of an Untrusted Relay
We consider a Gaussian two-hop network where the source and the destination can communicate only via a relay node who is both an eavesdropper and a Byzantine adversary. Both the s...
Xiang He, Aylin Yener
WCNC
2010
IEEE
15 years 1 months ago
A Novel Stability Weighted Clustering Algorithm for Multi-Hop Packet Radio Virtual Cellular Network
—Cooperative communications exploit the spatial diversity inherent in multiuser system by allowing cooperation among users having a wide range of channel qualities. How to search...
Qiyue Yu, Na Zhang, Weixiao Meng, Fumiyuki Adachi
ATAL
2010
Springer
14 years 10 months ago
UAV swarm coordination using cooperative control for establishing a wireless communications backbone
In this paper, we present a mechanism to fly a swarm of UAVs with the aim of establishing a wireless backbone over a pre-specified area. The backbone is aimed at connecting interm...
Achudhan Sivakumar, Colin Keng-Yan Tan
JSAC
2008
110views more  JSAC 2008»
14 years 9 months ago
Designing Multicast Protocols for Non-Cooperative Networks
Conventionally, most network protocols assume that the network entities who participate in the network activities will always behave as instructed. However, in practice, most netwo...
Weizhao Wang, Xiang-Yang Li, Yu Wang 0003, Zheng S...
ISITA
2010
14 years 7 months ago
Outage analysis and optimal power allocation for network-coding-based hybrid AF and DF
Network coding was proposed to increase the achievable throughput of multicast in a network. Recently, combining network coding into user cooperation has attracted research attenti...
Jooha Bek, Jaeyoung Lee, Jun Heo