Sciweavers

85 search results - page 4 / 17
» Probability of Error in Information-Hiding Protocols
Sort
View
82
Voted
TSP
2010
14 years 4 months ago
Mitigating channel estimation error with timing synchronization tradeoff in cooperative communications
Channel estimation error and co-channel interference (CCI) problems are among the main causes of performance degradation in wireless networks. In this paper, we investigate the im...
Ahmed S. Ibrahim, K. J. Ray Liu
ICIP
2002
IEEE
15 years 11 months ago
Protocols for distributed video streaming
With the explosive growth of video applications over the Internet, many approaches have been proposed to stream video effectively over packet switched, best-effort networks. In ou...
Thinh P. Q. Nguyen, Avideh Zakhor
SODA
2008
ACM
96views Algorithms» more  SODA 2008»
14 years 11 months ago
Unconditionally reliable message transmission in directed networks
In the unconditionally reliable message transmission (URMT) problem, two non-faulty players, the sender S and the receiver R are part of a synchronous network modeled as a directe...
Bhavani Shankar, Prasant Gopal, Kannan Srinathan, ...

Publication
545views
15 years 6 months ago
Reid et al.'s Distance Bounding Protocol and Mafia Fraud Attacks over Noisy Channels
Distance bounding protocols are an effective countermeasure against relay attacks including distance fraud, mafia fraud and terrorist fraud attacks. Reid et al. proposed the first ...
A. Mitrokotsa, C. Dimitrakakis, P. Peris-Lopez, J....
PEWASUN
2008
ACM
14 years 11 months ago
The impact of delayed topology information in proactive routing protocols for MANETS
In the design of many proactive routing protocols for MANETs, it is often assumed that topology information is disseminated instantly and error free. Exceptions include hazysighte...
Andres Medina, Stephan Bohacek