Sciweavers

332 search results - page 59 / 67
» Cooperative Relay Networks Using Fountain Codes
Sort
View
ICC
2007
IEEE
118views Communications» more  ICC 2007»
15 years 3 months ago
Sending Correlated Gaussian Sources over a Gaussian MAC: To Code, or not to Code
— We consider 1-helper problem in which one source provides partial side information to the fusion center (FC) to help reconstruction of the main source signal. Both sources comm...
Hamid Behroozi, M. Reza Soleymani
ICC
2009
IEEE
148views Communications» more  ICC 2009»
15 years 4 months ago
A Game-Theoretic Analysis of Inter-Session Network Coding
Abstract— A common assumption in the network coding literature is that the users are cooperative and will not pursue their own interests. However, this assumption can be violated...
Amir Hamed Mohsenian Rad, Jianwei Huang, Vincent W...
TKDE
2010
272views more  TKDE 2010»
14 years 7 months ago
P2P Reputation Management Using Distributed Identities and Decentralized Recommendation Chains
—Peer-to-peer (P2P) networks are vulnerable to peers who cheat, propagate malicious code, leech on the network, or simply do not cooperate. The traditional security techniques de...
Prashant Dewan, Partha Dasgupta
ICC
2008
IEEE
175views Communications» more  ICC 2008»
15 years 3 months ago
Routing in Cooperative Wireless Networks with Mutual-Information Accumulation
Cooperation between the nodes of wireless multihop networks can increase communication reliability, reduce energy consumption, and decrease latency. The possible improvements are ...
Stark C. Draper, Lingjia Liu, Andreas F. Molisch, ...
PIMRC
2008
IEEE
15 years 3 months ago
Distributed digital locked loops for time/frequency locking in packet-based wireless communication
— In infrastructure-less wireless systems network-wise time and frequency synchronization can be achieved by exchanging mutual synchronization errors among neighboring nodes. Coo...
Umberto Spagnolini, Nicola Varanese, Osvaldo Simeo...