Sciweavers

908 search results - page 128 / 182
» From communication networks to fuzzy sets
Sort
View
ICC
2007
IEEE
113views Communications» more  ICC 2007»
15 years 6 months ago
Complexity and Error Propagation of Localization Using Interferometric Ranging
— An interferometric ranging technique has been recently proposed as a possible way to localize ad hoc and sensor networks. Compared to the more common techniques such as receive...
Rui Huang, Gergely V. Záruba, Manfred Huber
BROADNETS
2004
IEEE
15 years 3 months ago
Handheld Routers: Intelligent Bandwidth Aggregation for Mobile Collaborative Communities
Multi-homed, mobile wireless computing and communication devices can spontaneously form communities to logically combine and share the bandwidth of each other's wide-area com...
Puneet Sharma, Sung-Ju Lee, Jack Brassil, Kang G. ...
CCS
2006
ACM
15 years 3 months ago
Deniable authentication and key exchange
We extend the definitional work of Dwork, Naor and Sahai from deniable authentication to deniable key-exchange protocols. We then use these definitions to prove the deniability fe...
Mario Di Raimondo, Rosario Gennaro, Hugo Krawczyk
CORR
2010
Springer
90views Education» more  CORR 2010»
14 years 10 months ago
Perfect Omniscience, Perfect Secrecy and Steiner Tree Packing
— We consider perfect secret key generation for a “pairwise independent network” model in which every pair of terminals share a random binary string, with the strings shared ...
Sirin Nitinawarat, Prakash Narayan
IWQOS
2011
Springer
14 years 2 months ago
OLIC: OnLine Information Compression for scalable hosting infrastructure monitoring
—Quality-of-service (QoS) management often requires a continuous monitoring service to provide updated information about different hosts and network links in the managed system. ...
Yongmin Tan, Xiaohui Gu, Vinay Venkatesh