Sciweavers

1443 search results - page 258 / 289
» Scheduling in Wireless Networks with Multiple Transmission C...
Sort
View
ESAS
2007
Springer
15 years 3 months ago
The Candidate Key Protocol for Generating Secret Shared Keys from Similar Sensor Data Streams
Secure communication over wireless channels necessitates authentication of communication partners to prevent man-in-the-middle attacks. For spontaneous interaction between independ...
Rene Mayrhofer
TWC
2008
129views more  TWC 2008»
14 years 11 months ago
Lifetime maximization for amplify-and-forward cooperative networks
Power allocation strategies are devised to maximize the network lifetime of amplify-and-forward (AF) cooperative networks in this work. We consider the scenario where one source an...
Wan-Jen Huang, Yao-Win Peter Hong, C. C. Jay Kuo
ICASSP
2011
IEEE
14 years 3 months ago
Cooperation strategies for secrecy in MIMO relay networks with unknown eavesdropper CSI
We investigate secure communications for a four-node relayeavesdropper channel with multiple data stream transmission, assuming that the eavesdropper’s channel state information...
Jing Huang, A. Lee Swindlehurst
MIDDLEWARE
2004
Springer
15 years 5 months ago
Transparent Information Dissemination
This paper explores integrating self-tuning updates and sequential consistency to enable transparent replication of large-scale information dissemination services. We focus our at...
Amol Nayate, Michael Dahlin, Arun Iyengar
ACSC
2008
IEEE
15 years 6 months ago
HOVER: hybrid on-demand distance vector routing for wireless mesh networks
Abstract— Hybrid Wireless Mesh Networks are a combination of mobile ad hoc networks and infrastructure wireless mesh networks, consisting of two types of nodes: Mobile Mesh Clien...
Stephan Mir, Asad Amir Pirzada, Marius Portmann