Sciweavers

5752 search results - page 225 / 1151
» Informative Labeling Schemes
Sort
View
INFOCOM
2009
IEEE
15 years 10 months ago
ElliPS: A Privacy Preserving Scheme for Sensor Data Storage and Query
—With in-network sensor data storage and query, storage nodes are responsible for storing the data collected by sensor nodes and answering queries from users. Thus, without prope...
Nalin Subramanian, Ka Yang, Wensheng Zhang, Daji Q...
WOWMOM
2009
ACM
146views Multimedia» more  WOWMOM 2009»
15 years 10 months ago
Optimization of WiMax modulation scheme with a cross layer erasure code
WIMAX (Worldwide Interoperability for Microwave Access) is a promising new networking technology that potentially offers high speed and wide area wireless access services that com...
Lei Zhang, Patrick Sénac, Roksana Boreli, M...
120
Voted
ICC
2007
IEEE
15 years 10 months ago
Robust Multibeam Opportunistic Schemes Under Quality of Service Constraints
— Scheduling in a Broadcast (BC) channel based on partial Channel State Information at the Transmitter (CSIT) is carried out in an opportunistic way, where several orthogonal bea...
Nizar Zorba, Ana I. Pérez-Neira
ICC
2007
IEEE
15 years 10 months ago
A Novel Piggyback Selection Scheme in IEEE 802.11e HCCA
— A control frame can be piggybacked in a data frame to increase the channel efficiency in a wireless communication such as IEEE 802.11 WLAN. However, the piggyback scheme may c...
Hyun-Jin Lee, Jae-Hyun Kim, Sunghyun Cho
IPPS
2007
IEEE
15 years 10 months ago
Transaction Based Authentication Scheme for Mobile Communication: A Cognitive Agent Based Approach
The vulnerable air interface, device level constraints, and insecure encryption techniques of wireless networks have naturally increased the chance of attacker obtaining users inf...
B. Sathish Babu, Pallapa Venkataram