Sciweavers

2265 search results - page 190 / 453
» Recovering Exchanged Data
Sort
View
CEC
2008
IEEE
15 years 10 months ago
Fast symmetric keys generation via mutual mirroring process
—This paper presents an eavesdropper-proof algorithm that is capable of fast generating symmetric (secret) keys. Instead of literally exchanging secret keys, both the sender and ...
Chun-Shun Tseng, Ya-Yun Jheng, Sih-Yin Shen, Jung-...
GLOBECOM
2008
IEEE
15 years 10 months ago
On Base Station Cooperation Schemes for Downlink Network MIMO under a Constrained Backhaul
— Next generation mobile comunications systems will most likely employ multi-cell cooperative signal processing schemes, often referred to as network MIMO, as these are known to ...
Patrick Marsch, Gerhard Fettweis
98
Voted
HICSS
2008
IEEE
114views Biometrics» more  HICSS 2008»
15 years 10 months ago
Mobile Social Networking: An Information Grounds Perspective
Information grounds are places where people exchange information. Here we examine use of a mobile device-based social networking service as an information ground. The service allo...
Scott Counts, Karen E. Fisher
ICC
2008
IEEE
127views Communications» more  ICC 2008»
15 years 10 months ago
Power and Bandwidth Allocation in Cooperative Dirty Paper Coding
—The cooperative dirty paper coding (DPC) rate region is investigated in a two-transmitter two-receiver network with full channel state information available at all terminals. Th...
Chris T. K. Ng, Nihar Jindal, Andrea J. Goldsmith,...
NOCS
2007
IEEE
15 years 10 months ago
On the Design of a Photonic Network-on-Chip
Recent remarkable advances in nanoscale siliconphotonic integrated circuitry specifically compatible with CMOS fabrication have generated new opportunities for leveraging the uni...
Assaf Shacham, Keren Bergman, Luca P. Carloni