Sciweavers

312 search results - page 33 / 63
» Protocols for Non-Deterministic Communication over Synchrono...
Sort
View
77
Voted
IMC
2004
ACM
15 years 3 months ago
Robust synchronization of software clocks across the internet
Accurate, reliable timestamping which is also convenient and inexpensive is needed in many important areas including real-time network applications and network measurement. Recent...
Darryl Veitch, Satish Babu Korada, Attila Pá...
SCN
2010
Springer
232views Communications» more  SCN 2010»
14 years 7 months ago
Authenticated Key Agreement with Key Re-use in the Short Authenticated Strings Model
Serge Vaudenay [20] introduced a notion of Message Authentication (MA) protocols in the Short Authenticated String (SAS) model. A SAS-MA protocol authenticates arbitrarily long mes...
Stanislaw Jarecki, Nitesh Saxena
80
Voted
JSAC
2007
86views more  JSAC 2007»
14 years 9 months ago
Asymptotically optimal cooperative wireless networks with reduced signaling complexity
Abstract— This paper considers an orthogonal amplify-andforward (OAF) protocol for cooperative relay communication over Rayleigh-fading channels in which the intermediate relays ...
Petros Elia, Frédérique E. Oggier, P...
VTC
2006
IEEE
105views Communications» more  VTC 2006»
15 years 3 months ago
Iterative Equalization and Decoding for Unsynchronized OFDMA Uplink Transmissions
— For the uplink transmission of a coded OFDMA system, we present an iterative receiver that performs joint frequency offset acquisition, channel estimation and maximum a posteri...
Man-On Pun, Michele Morelli, C. C. Jay Kuo
MSWIM
2003
ACM
15 years 2 months ago
On the application of traffic engineering over bluetooth ad hoc networks
The seamless communication of data and voice over short-range, point-to-multipoint wireless links between mobile and/or stationary devices is becoming a reality by newly introduce...
Sachin Abhyankar, Rishi Toshniwal, Carlos de M. Co...