Sciweavers

1054 search results - page 161 / 211
» Secret Communication with Feedback
Sort
View
SIGMETRICS
2011
ACM
191views Hardware» more  SIGMETRICS 2011»
14 years 21 days ago
Stability analysis of QCN: the averaging principle
Data Center Networks have recently caused much excitement in the industry and in the research community. They represent the convergence of networking, storage, computing and virtu...
Mohammad Alizadeh, Abdul Kabbani, Berk Atikoglu, B...
ICC
2009
IEEE
114views Communications» more  ICC 2009»
15 years 4 months ago
Distributed Gradient Based Gain Allocation for Coherent Multiuser AF Relaying Networks
—A set of distributed non-cooperating relay antennas is known to be capable of orthogonalizing multiple sourcedestination pairs in space by coherent amplify-and-forward (AF) rela...
Celal Esli, Jörg Wagner, Armin Wittneben
INFOCOM
2009
IEEE
15 years 4 months ago
Effective Delay Control in Online Network Coding
—Motivated by streaming applications with stringent delay constraints, we consider the design of online network coding algorithms with timely delivery guarantees. Assuming that t...
João Barros, Rui A. Costa, Daniele Munarett...
ICICS
2009
Springer
15 years 4 months ago
Security Analysis of the GF-NLFSR Structure and Four-Cell Block Cipher
The overall structure is one of the most important properties of block ciphers. At present, the most common structures include Feistel structure, SP structure, MISTY structure, L-M...
Wenling Wu, Lei Zhang, Liting Zhang, Wentao Zhang
ICC
2008
IEEE
123views Communications» more  ICC 2008»
15 years 4 months ago
A Physical-Layer Technique to Enhance Authentication for Mobile Terminals
Abstract— We propose an enhanced physical-layer authentication scheme for multi-carrier wireless systems, where transmission bursts consist of multiple frames. More specifically...
Liang Xiao, Larry J. Greenstein, Narayan B. Manday...