Sciweavers

2068 search results - page 387 / 414
» Performance Analysis of a Distributed Wireless Access Scheme
Sort
View
CCS
2009
ACM
15 years 10 months ago
PBES: a policy based encryption system with application to data sharing in the power grid
In distributed systems users need the ability to share sensitive content with multiple other recipients based on their ability to satisfy arbitrary policies. One such system is el...
Rakeshbabu Bobba, Himanshu Khurana, Musab AlTurki,...
ICC
2008
IEEE
171views Communications» more  ICC 2008»
15 years 4 months ago
On the Capacity of Training-Based Transmissions with Input Peak Power Constraints
— 1 In this paper, training-based transmissions over a priori unknown Rayleigh block fading channels are considered. The input signals are assumed to be subject to peak power con...
Mustafa Cenk Gursoy
ICDCS
2007
IEEE
15 years 4 months ago
An Empirical Study of Collusion Behavior in the Maze P2P File-Sharing System
Peer-to-peer networks often use incentive policies to encourage cooperation between nodes. Such systems are generally susceptible to collusion by groups of users in order to gain ...
Qiao Lian, Zheng Zhang, Mao Yang, Ben Y. Zhao, Yaf...
ICPADS
2005
IEEE
15 years 3 months ago
Delay-Energy Aware Routing Protocol for Sensor and Actor Networks
We present a novel Delay-Energy Aware Routing Protocol (DEAP) for for heterogeneous sensor and actor networks. DEAP enable a wide range of tradoffs between delay and energy consum...
Arjan Durresi, Vamsi Paruchuri, Leonard Barolli
ICDCS
2010
IEEE
14 years 11 months ago
ASAP: Scalable Identification and Counting for Contactless RFID Systems
The growing importance of operations such as identification, location sensing and object tracking has led to increasing interests in contactless Radio Frequency Identification (RFI...
Chen Qian, Yunhuai Liu, Hoilun Ngan, Lionel M. Ni