Sciweavers

678 search results - page 67 / 136
» Myopic Coding in Wireless Networks
Sort
View
CCS
2008
ACM
15 years 5 months ago
Code injection attacks on harvard-architecture devices
Harvard architecture CPU design is common in the embedded world. Examples of Harvard-based architecture devices are the Mica family of wireless sensors. Mica motes have limited me...
Aurélien Francillon, Claude Castelluccia
TCOM
2008
82views more  TCOM 2008»
15 years 3 months ago
Detecting the number of signals in wireless DS-CDMA networks
In this paper, a new information theoretic algorithm is proposed for signal enumeration in DS-CDMA networks. The approach is based on the predictive description length (PDL) of the...
Shahrokh Valaee, Shahram Shahbazpanahi
CNSR
2010
IEEE
131views Communications» more  CNSR 2010»
15 years 1 months ago
Prioritized Access for Emergency Stations in Next Generation Broadband Wireless Networks
We focus on the interference between mobile stations as they attempt to gain access to an OFDMA-based WiMAX/IEEE 802.16 network. We propose a set of strategies that enable base st...
Paul Boone, Michel Barbeau, Evangelos Kranakis
137
Voted
INFOCOM
1999
IEEE
15 years 8 months ago
Accessing Multiple Mirror Sites in Parallel: Using Tornado Codes to Speed Up Downloads
Mirror sites enable client requests to be serviced by any of a number of servers, reducing load at individual servers and dispersing network load. Typically, a client requests serv...
John W. Byers, Michael Luby, Michael Mitzenmacher
VTC
2008
IEEE
159views Communications» more  VTC 2008»
15 years 10 months ago
Symbol Error Probability of Distributed-Alamouti Scheme in Wireless Relay Networks
—In this paper, we analyze the maximum likelihood decoding performance of non-regenerative cooperation employing Alamouti scheme. Specifically, we derive two closed-form express...
Trung Q. Duong, Dac-Binh Ha, Hoai-An Tran, Nguyen-...