Sciweavers

117 search results - page 14 / 24
» Perfectly Reliable Message Transmission
Sort
View
GLOBECOM
2009
IEEE
15 years 4 months ago
CoRe-MAC: A MAC-Protocol for Cooperative Relaying in Wireless Networks
Cooperative relaying methods can improve wireless links, but introduce overhead due to relay selection and resource reservation compared to non-cooperative transmission. In order t...
Helmut Adam, Wilfried Elmenreich, Christian Bettst...
115
Voted
CORR
2010
Springer
67views Education» more  CORR 2010»
14 years 10 months ago
Secret Sharing LDPC Codes for the Constrained Gaussian Wiretap Channel
The problem of secret sharing over the Gaussian wiretap channel is considered. A source and a destination intend to share secret information over a Gaussian channel in the presenc...
Chan Wong Wong, Tan F. Wong, John M. Shea
IADIS
2003
15 years 1 months ago
A Framework of High Confidence E-Healthcare Information System
In this paper a framework for a high-confidence e-healthcare information system which meets five criteria including availability, reliability, security, survivability and restorab...
Shun-Chieh Lin, Wen-Hsiang Tsai, Shian-Shyong Tsen...
103
Voted
INFOCOM
1992
IEEE
15 years 4 months ago
A Study on the Inaccessibility Characteristics of ISO 8802/4 Token-Bus LANs
Local area networks have long been established as the basis for distributed systems. Continuity of service and bounded and known message delivery latency are requirements of a num...
José Rufino, Paulo Veríssimo
103
Voted
IJAHUC
2010
130views more  IJAHUC 2010»
14 years 11 months ago
Secure traffic data propagation in Vehicular Ad Hoc Networks
: In vehicular ad hoc network, vehicles can share traffic/emergency information. The information should not be modified/manipulated during transmission without detection. We pres...
Baber Aslam, Soyoung Park, Cliff Changchun Zou, Da...