Sciweavers

820 search results - page 93 / 164
» Protocols for Asymmetric Communication Channels
Sort
View
ADHOCNOW
2006
Springer
15 years 4 months ago
Initialization for Ad Hoc Radio Networks with Carrier Sensing and Collision Detection
We consider an ad-hoc network consisting of devices that try to gain access for transmission through a shared communication channel. We redesign randomized protocol of Cai, Lu and ...
Jacek Cichon, Miroslaw Kutylowski, Marcin Zawada
FOCS
2006
IEEE
15 years 4 months ago
Cryptography from Anonymity
There is a vast body of work on implementing anonymous communication. In this paper, we study the possibility of using anonymous communication as a building block, and show that o...
Yuval Ishai, Eyal Kushilevitz, Rafail Ostrovsky, A...
CRYPTO
2006
Springer
159views Cryptology» more  CRYPTO 2006»
15 years 1 months ago
Asymptotically Optimal Two-Round Perfectly Secure Message Transmission
Abstract. The problem of perfectly secure message transmission concerns two synchronized non-faulty processors sender (S) and receiver (R) that are connected by a synchronous netwo...
Saurabh Agarwal, Ronald Cramer, Robbert de Haan
ICC
2007
IEEE
15 years 4 months ago
VoIP Capacity Allocation Using an Adaptive Voice Packetization Server in IEEE 802.11 WLANs
— WLAN VoIP capacity is known to be very low due to the effects of overheads at various protocol layers. An IEEE 802.11b access point (AP) operating at 11 Mbps for example, can s...
Ahmad M. Kholaif, Terence D. Todd
INFOCOM
2007
IEEE
15 years 4 months ago
Cooperative Strategies and Optimal Scheduling for Tree Networks
Abstract— In this paper, we develop and analyze a lowcomplexity cooperative protocol that significantly increases the average throughput of multi-hop upstream transmissions for ...
Alexandre de Baynast, Omer Gurewitz, Edward W. Kni...