Sciweavers

2068 search results - page 168 / 414
» Performance Analysis of a Distributed Wireless Access Scheme
Sort
View
SCN
2010
Springer
145views Communications» more  SCN 2010»
15 years 2 months ago
Distributed Private-Key Generators for Identity-Based Cryptography
An identity-based encryption (IBE) scheme can greatly reduce the complexity of sending encrypted messages. However, an IBE scheme necessarily requires a private-key generator (PKG)...
Aniket Kate, Ian Goldberg
GLOBECOM
2008
IEEE
15 years 10 months ago
Information Theoretic Approach to Signal Feature Detection for Cognitive Radio
—Cognitive radio (CR) systems need to be able to adjust the transceiver characteristics in response to stimuli received from the radio environment. Therefore, monitoring the wire...
Mostafa Z. Afgani, Sinan Sinanovic, Harald Haas
135
Voted
WINET
2002
124views more  WINET 2002»
15 years 3 months ago
Improving Energy Efficiency of Centrally Controlled Wireless Data Networks
Wireless network access protocols can assist nodes to conserve energy by identifying when they can enter low energy states. The goal is to put all nodes not involved in a transmiss...
John A. Stine, Gustavo de Veciana
141
Voted
ICDCS
2003
IEEE
15 years 9 months ago
Responsive Security for Stored Data
We present the design of a distributed store that offers various levels of security guarantees while tolerating a limited number of nodes that are compromised by an adversary. The...
Subramanian Lakshmanan, Mustaque Ahamad, H. Venkat...
104
Voted
FTDCS
2003
IEEE
15 years 9 months ago
Analysis of Parallel Downloading for Large File Distribution
Recently, the scheme of parallel downloading (PD) has been adopted by a number of Internet file downloading applications. With the wide deployment of content distribution network...
Simon G. M. Koo, Catherine Rosenberg, Dongyan Xu