Sciweavers

3031 search results - page 452 / 607
» Investigating human-computer optimization
Sort
View
INFOCOM
2009
IEEE
15 years 9 months ago
Power Controlled Scheduling with Consecutive Transmission Constraints: Complexity Analysis and Algorithm Design
Abstract—We study the joint power control and minimumframe-length scheduling problem in wireless networks, under the physical interference model and subject to consecutive transm...
Liqun Fu, Soung Chang Liew, Jianwei Huang
INFOCOM
2009
IEEE
15 years 9 months ago
Optimum Network Coding for Delay Sensitive Applications in WiMAX Unicast
—MAC layer random network coding (MRNC) was proposed in [1] as an alternative to HARQ for reliable data transmission in WiMAX unicast. It has been shown that MRNC achieves a high...
Amin Alamdar Yazdi, Sameh Sorour, Shahrokh Valaee,...
IPPS
2009
IEEE
15 years 9 months ago
Performance analysis of distributed intrusion detection protocols for mobile group communication systems
Under highly security vulnerable, resource restricted, and dynamically changing mobile ad hoc environments, it is critical to be able to maximize the system lifetime while boundin...
Jin-Hee Cho, Ing-Ray Chen
ADHOCNOW
2009
Springer
15 years 9 months ago
Autonomous Transmission Power Adaptation for Multi-Radio Multi-Channel Wireless Mesh Networks
Multi-Radio Multi-Channel (MRMC) systems are key to power control problems in WMNs. Previous studies have emphasized throughput maximization in such systems as the main design chal...
Thomas O. Olwal, Barend J. van Wyk, Karim Djouani,...
121
Voted
ASIACRYPT
2009
Springer
15 years 9 months ago
Improved Cryptanalysis of Skein
The hash function Skein is the submission of Ferguson et al. to the NIST Hash Competition, and is arguably a serious candidate for selection as SHA-3. This paper presents the firs...
Jean-Philippe Aumasson, Çagdas Çalik...