Sciweavers

112 search results - page 9 / 23
» Perfect Secrecy in Wireless Networks
Sort
View
66
Voted
TCOM
2010
91views more  TCOM 2010»
14 years 8 months ago
Robust Power Allocation Algorithms for Wireless Relay Networks
—Resource allocation promises significant benefits in wireless networks. In order to fully reap these benefits, it is important to design efficient resource allocation algori...
Tony Q. S. Quek, Moe Z. Win, Marco Chiani
CORR
2008
Springer
187views Education» more  CORR 2008»
14 years 9 months ago
Coalitions in Cooperative Wireless Networks
Cooperation between rational users in wireless networks is studied using coalitional game theory. Using the rate achieved by a user as its utility, it is shown that the stable coal...
Suhas Mathur, Lalitha Sankar, Narayan B. Mandayam
CORR
2010
Springer
143views Education» more  CORR 2010»
14 years 9 months ago
Continuum Percolation in the Intrinsically Secure Communications Graph
The intrinsically secure communications graph (-graph) is a random graph which captures the connections that can be securely established over a large-scale network, in the presence...
Pedro C. Pinto, Moe Z. Win
INFOCOM
2011
IEEE
14 years 1 months ago
Aggregation capacity of wireless sensor networks: Extended network case
—A critical function of wireless sensor networks (WSNs) is data gathering. While, one is often only interested in collecting a relevant function of the sensor measurements at a s...
Cheng Wang, Changjun Jiang, Yunhao Liu, Xiang-Yang...
INFOCOM
2010
IEEE
14 years 8 months ago
INPAC: An Enforceable Incentive Scheme for Wireless Networks using Network Coding
—Wireless mesh networks have been widely deployed to provide broadband network access, and their performance can be significantly improved by using a new technology called netwo...
Tingting Chen, Sheng Zhong