Sciweavers

3898 search results - page 242 / 780
» On the Bit Extraction Problem
Sort
View
117
Voted
ICALP
2009
Springer
15 years 10 months ago
Names Trump Malice: Tiny Mobile Agents Can Tolerate Byzantine Failures
Abstract. We introduce a new theoretical model of ad hoc mobile computing in which agents have severely restricted memory, highly unpredictable movement and no initial knowledge of...
Rachid Guerraoui, Eric Ruppert
INDOCRYPT
2009
Springer
15 years 10 months ago
Two Attacks against the Ff RFID Protocol
This paper investigates a new family of RFID protocols called Ff that grew out of a proposal made at ESORICS 2007. This family has the property of having highly efficient implement...
Olivier Billet, Kaoutar Elkhiyaoui
136
Voted
GLOBECOM
2008
IEEE
15 years 9 months ago
A Dynamic Programming Approach for Routing in Wireless Mesh Networks
—The routing problem in Wireless Mesh Networks is concerned with finding “good” source-destination paths. It generally faces multiple objectives to be optimized, such as i) ...
Jorge Crichigno, Joud Khoury, Min-You Wu, Wei Shu
133
Voted
GLOBECOM
2008
IEEE
15 years 9 months ago
Transmitter-Based Minimization of Error Rates in the Downlink of Wireless Systems
—Using CDMA technology, one has to contend with interference in frequency-selective channels caused by multipath propagation and fading. Transmitter-based methods such as Zero Fo...
Fred Richter, Andreas Fischer, René Habendo...
107
Voted
ICASSP
2008
IEEE
15 years 9 months ago
Adaptive detection for a differential chaos-based multiple access system on unknown multipath fading channels
This paper addresses the problem of bit detection for a chaos-based multiple-access system. In particular, one considers the Differential Chaos Shift Keying modulation. It is assu...
Martial Coulon, Daniel Roviras