Sciweavers

130 search results - page 11 / 26
» Information Access in Africa: Problems with Every Channel
Sort
View
CORR
2008
Springer
142views Education» more  CORR 2008»
14 years 10 months ago
On the Capacity and Diversity-Multiplexing Tradeoff of the Two-Way Relay Channel
This paper considers a multiple input multiple output (MIMO) two-way relay channel, where two nodes want to exchange data with each other using multiple relays. An iterative algor...
Rahul Vaze, Robert W. Heath Jr.
FDTC
2009
Springer
189views Cryptology» more  FDTC 2009»
15 years 4 months ago
KeeLoq and Side-Channel Analysis-Evolution of an Attack
—Last year we were able to break KeeLoq, which is a 64 bit block cipher that is popular for remote keyless entry (RKE) systems. KeeLoq RKEs are widely used for access control pur...
Christof Paar, Thomas Eisenbarth, Markus Kasper, T...
TCC
2007
Springer
89views Cryptology» more  TCC 2007»
15 years 4 months ago
On Secret Sharing Schemes, Matroids and Polymatroids
Abstract. One of the main open problems in secret sharing is the characterization of the access structures of ideal secret sharing schemes. As a consequence of the results by Brick...
Jaume Martí-Farré, Carles Padr&oacut...
ISCAS
2002
IEEE
149views Hardware» more  ISCAS 2002»
15 years 2 months ago
Adaptive end-to-end optimization of mobile video streaming using QoS negotiation
Video streaming over wireless links is a non-trivial problem due to the large and frequent changes in the quality of the underlying radio channel combined with latency constraints...
Jacco R. Taal, Koen Langendoen, Arjen van der Scha...
MOBICOM
2009
ACM
15 years 4 months ago
Interference management via rate splitting and HARQ over time-varying fading channels
The coexistence of two unlicensed links is considered, where one link interferes with the transmission of the other, over a timevarying, block-fading channel. In the absence of fa...
Marco Levorato, Osvaldo Simeone, Urbashi Mitra