Sciweavers

1054 search results - page 28 / 211
» Secret Communication with Feedback
Sort
View
GLOBECOM
2009
IEEE
15 years 4 months ago
Subchannel Allocation in Relay-Enhanced OFDMA Downlink with Imperfect Feedback
Jouko Leinonen, Taneli Riihonen, Jyri Häm&aum...
GLOBECOM
2007
IEEE
15 years 4 months ago
Opportunistic Feedback in OFDMA Downlink
—This paper presents an opportunistic feedback (OF) protocol that reduces the amount of channel-state-information (CSI) feedback for the OFDMA downlink system. The OF protocol as...
Rajiv Agarwal, Vineet Abhishek, Rath Vannithamby, ...
GLOBECOM
2006
IEEE
15 years 3 months ago
Feedback Capacity of Stationary Sources over Gaussian Intersymbol Interference Channels
Abstract— We consider discrete-time channels with finitelength intersymbol interference and additive Gaussian noise. The channel noise is considered to be a stationary ARMA (aut...
Shaohua Yang, Aleksandar Kavcic, Sekhar Tatikonda
JSAC
2010
84views more  JSAC 2010»
14 years 8 months ago
A little feedback can simplify sensor network cooperation
—Shannon’s discovery of digital communication has shaped the architecture of virtually all communication systems in use today. The digital communication paradigm is built aroun...
Anand D. Sarwate, Michael Gastpar
IJNSEC
2007
161views more  IJNSEC 2007»
14 years 9 months ago
Data Hiding: Current Status and Key Issues
Image steganography is a covert communication method that uses an image as the cover to hide the truth from potential attackers that some secret message hidden in the image is bei...
Nan-I Wu, Min-Shiang Hwang