Sciweavers

2945 search results - page 445 / 589
» Noisy Network Coding
Sort
View
108
Voted
ANSS
2008
IEEE
15 years 4 months ago
SCAR - Scattering, Concealing and Recovering Data within a DHT
This paper describes a secure and reliable method for storing data in a distributed hash table (DHT) leveraging the inherent properties of the DHT to provide a secure storage subs...
Bryan N. Mills, Taieb Znati
GLOBECOM
2008
IEEE
15 years 4 months ago
Characterization of Relay Channels Using the Bhattacharyya Parameter
—Relay systems have large and complex parameter spaces, which makes it difficult to determine the parameter region where the system achieves a given performance criterion, such ...
Josephine P. K. Chu, Andrew W. Eckford, Raviraj S....
ICMCS
2008
IEEE
150views Multimedia» more  ICMCS 2008»
15 years 4 months ago
Scalable video adaptation optimization using soft decision scheme
Video transmission over a heterogeneous network suffers a condition that it has required to satisfy many different constraints because of the variety limitations of client equipme...
Chia-Ho Pan, Sheng-Chieh Huang, I-Hsien Lee, Chung...
PIMRC
2008
IEEE
15 years 4 months ago
Decoding-based channel estimation for selective cooperation diversity protocols
— We describe and analyze Minimum Path Difference (MPD), a metric to improve threshold-based Selection Decodeand-Forward (SDF) protocols in cooperative wireless networks with cha...
Stefan Valentin, Tobias Volkhausen, Furuzan Atay O...
CODES
2007
IEEE
15 years 4 months ago
Improved response time analysis of tasks scheduled under preemptive Round-Robin
Round-Robin scheduling is the most popular time triggered scheduling policy, and has been widely used in communication networks for the last decades. It is an efficient schedulin...
Razvan Racu, Li Li, Rafik Henia, Arne Hamann, Rolf...