Sciweavers

361 search results - page 56 / 73
» Relay selection methods for wireless cooperative communicati...
Sort
View
MOBICOM
2000
ACM
15 years 1 months ago
Intrusion detection in wireless ad-hoc networks
As the recent denial-of-service attacks on several major Internet sites have shown us, no open computer network is immune from intrusions. The wireless ad-hoc network is particula...
Yongguang Zhang, Wenke Lee
ICC
2009
IEEE
166views Communications» more  ICC 2009»
15 years 4 months ago
A Cross-Layer Perspective on Rateless Coding for Wireless Channels
Abstract—Rateless coding ensures reliability by providing everincreasing redundancy, traditionally at the packet level (i.e. the application layer) through erasure coding. This p...
Thomas A. Courtade, Richard D. Wesel
JSAC
2007
79views more  JSAC 2007»
14 years 9 months ago
Collaborative decoding in bandwidth-constrained environments
We present a cooperative communication scheme in which a group of receivers can collaborate to decode a message that none of the receivers can individually decode. The receivers a...
Arun Nayagam, John M. Shea, Tan F. Wong
INFOCOM
2002
IEEE
15 years 2 months ago
Downlink Power Allocation for Multi-class CDMA Wireless Networks
Abstract—In this paper we consider the downlink power allocation problem for multi-class CDMA wireless networks. We use a utility based power allocation framework to treat multi-...
Jangwon Lee, Ravi Mazumdar, Ness B. Shroff
ICDCSW
2007
IEEE
15 years 3 months ago
Object-Swapping for Resource-Constrained Devices
Mobile devices are still memory-constrained when compared to desktop and laptop computers. Thus, in some circumstances, even while occupied by useful objects, some memory must be ...
Luís Veiga, Paulo Ferreira