Sciweavers

2945 search results - page 182 / 589
» Noisy Network Coding
Sort
View
161
Voted
ADHOCNOW
2006
Springer
15 years 9 months ago
Authenticated In-Network Programming for Wireless Sensor Networks
Abstract. Current in-network programming protocols for sensor networks allow an attacker to gain control of the network or disrupt its proper functionality by disseminating malicio...
Ioannis Krontiris, Tassos Dimitriou
151
Voted
ICICS
2010
Springer
15 years 1 months ago
Efficient Authentication for Mobile and Pervasive Computing
With today's technology, many applications rely on the existence of small devices that can exchange information and form communication networks. In a significant portion of su...
Basel Alomair, Radha Poovendran
135
Voted
SIGCSE
2000
ACM
119views Education» more  SIGCSE 2000»
15 years 8 months ago
Bugs as features: teaching network protocols through debugging
Being exposed to well-written code is a valuable experience for students -- especially when the code is larger or more complex than they are currently capable of writing. In addit...
Brad Richards
129
Voted
ASAP
2006
IEEE
147views Hardware» more  ASAP 2006»
15 years 5 months ago
Reconfigurable Shuffle Network Design in LDPC Decoders
Several semi-parallel decoding architectures have been explored by researchers for the quasi-cyclic low density parity check (LDPC) codes. In these architectures, the reconfigurab...
Jun Tang, Tejas Bhatt, Vishwas Sundaramurthy
161
Voted
WCNC
2010
IEEE
15 years 2 months ago
End-To-End HARQ in Cognitive Radio Networks
Abstract—Cognitive radio networks (CRN) may greatly enhance the throughput based on a given bandwidth. CRN has a unique feature, consisting of uni-directional opportunistic wirel...
Weng-Chon Ao, Kwang-Cheng Chen