Sciweavers

317 search results - page 41 / 64
» Practical Key Distribution Schemes for Channel Protection
Sort
View
MSWIM
2005
ACM
15 years 3 months ago
Adaptive transmission opportunity with admission control for IEEE 802.11e networks
The increase of IEEE 802.11’s bandwidth led to a deployment of many multimedia applications over wireless networks. Nevertheless, these applications impose stringent constraints...
Adlen Ksentini, Abdelhak Guéroui, Mohamed N...
CORR
2011
Springer
177views Education» more  CORR 2011»
14 years 1 months ago
Downlink SDMA with Limited Feedback in Interference-Limited Wireless Networks
The tremendous capacity gains promised by space division multiple access (SDMA) depend critically on the accuracy of the transmit channel state information. In the broadcast chann...
Marios Kountouris, Jeffrey G. Andrews
ACMICEC
2007
ACM
145views ECommerce» more  ACMICEC 2007»
15 years 1 months ago
Advance selling and internet intermediary: travel distribution strategies in the e-commerce age
We investigate two challenges advance of e-commerce creates for traditional practice of travel distribution. First, we explore whether travel providers benefit from strategically ...
Zhe Qu
ISAAC
2010
Springer
276views Algorithms» more  ISAAC 2010»
14 years 7 months ago
Anonymous Fuzzy Identity-Based Encryption for Similarity Search
Abstract. In this paper, we consider the problem of predicate encryption and focus on the predicate for testing whether the hamming distance between the attribute X of a data item ...
David W. Cheung, Nikos Mamoulis, W. K. Wong, Siu-M...
SIGCOMM
2010
ACM
14 years 10 months ago
Design and implementation of an "approximate" communication system for wireless media applications
All practical wireless communication systems are prone to errors. At the symbol level such wireless errors have a well-defined structure: when a receiver decodes a symbol erroneou...
Sayandeep Sen, Syed Gilani, Shreesha Srinath, Step...