Sciweavers

678 search results - page 102 / 136
» Myopic Coding in Wireless Networks
Sort
View
78
Voted
CORR
2010
Springer
148views Education» more  CORR 2010»
15 years 17 days ago
Techniques for Enhanced Physical-Layer Security
Information-theoretic security--widely accepted as the strictest notion of security--relies on channel coding techniques that exploit the inherent randomness of propagation channel...
Pedro C. Pinto, João Barros, Moe Z. Win
PERCOM
2007
ACM
16 years 2 days ago
Automatic Generation of Device User-Interfaces?
One of the visions of pervasive computing is using mobile computers to interact with networked devices. A question raised by this vision is: Should the userinterfaces of these dev...
Olufisayo Omojokun, Prasun Dewan
TON
2010
189views more  TON 2010»
14 years 7 months ago
Analysis, Simulation, and Implementation of VCP: A Wireless Profiling
Abstract--Every congestion control protocol operating in wireless networks is potentially faced with two major challenges of performance degradation. These sources are (a) the coup...
Xiaolong Li, Homayoun Yousefi'zadeh
PERCOM
2008
ACM
16 years 2 days ago
ReMo : An Energy Efficient Reprogramming Protocol for Mobile Sensor Networks
Existing code update protocols for reprogramming nodes in a sensor network are either unsuitable or inefficient when used in a mobile environment. The prohibitive factor of uncert...
Pradip De, Yonghe Liu, Sajal K. Das
98
Voted
QSHINE
2005
IEEE
15 years 6 months ago
Retransmission Strategies for Wireless Connections with Resource-Limited Devices
Protocols designed to provide error-free communications over lossy links, at both data link and transport layers, commonly employ the idea of sliding windows, which is based on th...
Lavy Libman