Sciweavers

85 search results - page 9 / 17
» Probability of Error in Information-Hiding Protocols
Sort
View
IJACT
2010
90views more  IJACT 2010»
14 years 8 months ago
Unconditionally reliable and secure message transmission in undirected synchronous networks: possibility, feasibility and optima
: We study the interplay of network connectivity and the issues related to the `possibility', `feasibility' and `optimality' for unconditionally reliable message tra...
Arpita Patra, Ashish Choudhury, C. Pandu Rangan, K...
ICC
2007
IEEE
121views Communications» more  ICC 2007»
15 years 8 months ago
Design of Collaborative Codes Achieving Space-Time Diversity
— In wireless networks, the use of collaboration has been shown to provide an increase in reliability due to an increase in diversity. Specifically it has been shown that by havi...
Patrick Tooher, Hesam Khoshneviss, M. Reza Soleyma...
INFOCOM
2011
IEEE
14 years 5 months ago
SigSag: Iterative detection through soft message-passing
—The multiple-access framework of ZigZag decoding [1] is a useful technique for combating interference via multiple repeated transmissions, and is known to be compatible with dis...
Arash Saber Tehrani, Alexandros G. Dimakis, Michae...
135
Voted
IPSN
2004
Springer
15 years 7 months ago
Adaptive clock synchronization in sensor networks
Recent advances in technology have made low cost, low power wireless sensors a reality. Clock synchronization is an important service in any distributed system, including sensor n...
Santashil PalChaudhuri, Amit Kumar Saha, David B. ...
114
Voted
ICCCN
2008
IEEE
15 years 8 months ago
Sources and Monitors: A Trust Model for Peer-to-Peer Networks
—In this paper, we introduce an objective model of trust in peer-to-peer networks. Based on this model, we develop protocols that can be used by the peers in a peer-to-peer netwo...
Yan Li, Mohamed G. Gouda