Sciweavers

40 search results - page 8 / 8
» Performance analysis of a slotted-ALOHA protocol on a captur...
Sort
View
LCN
2008
IEEE
14 years 19 days ago
Modeling of two-flow interactions under SINR model in Multi-hop Wireless Networks
—Carrier Sense Multiple Access (CSMA) protocols in Multi-hop Wireless Networks (MHWN) are known to suffer from different forms of the hidden and exposed terminal problems, leadin...
Saquib Razak, Nael B. Abu-Ghazaleh, Vinay Kolar
INFOCOM
2010
IEEE
13 years 4 months ago
Exploiting Multiple-Antenna Diversity for Shared Secret Key Generation in Wireless Networks
—Generating a secret key between two parties by extracting the shared randomness in the wireless fading channel is an emerging area of research. Previous works focus mainly on si...
Kai Zeng, Daniel Wu, An Chan, Prasant Mohapatra
SBCCI
2005
ACM
123views VLSI» more  SBCCI 2005»
13 years 11 months ago
Fault tolerance overhead in network-on-chip flow control schemes
Flow control mechanisms in Network-on-Chip (NoC) architectures are critical for fast packet propagation across the network and for low idling of network resources. Buffer manageme...
Antonio Pullini, Federico Angiolini, Davide Bertoz...
VTC
2010
IEEE
174views Communications» more  VTC 2010»
13 years 4 months ago
Multiple-Relay Aided Distributed Turbo Coding Assisted Differential Unitary Space-Time Spreading for Asynchronous Cooperative Ne
—This paper proposes a cooperative space-time coding (STC) protocol, amalgamating the concepts of asynchronous cooperation, non-coherent detection as well as Distributed Turbo Co...
Shinya Sugiura, Soon Xin Ng, Lingkun Kong, Sheng C...
CCS
2010
ACM
13 years 3 months ago
Practical leakage-resilient pseudorandom generators
Cryptographic systems and protocols are the core of many Internet security procedures (such as SSL, SSH, IPSEC, DNSSEC, secure mail, etc.). At the heart of all cryptographic funct...
Yu Yu, François-Xavier Standaert, Olivier P...