Sciweavers

1054 search results - page 78 / 211
» Secret Communication with Feedback
Sort
View
GLOBECOM
2008
IEEE
15 years 4 months ago
Joint Power Loading of Data and Pilots in OFDM Using Imperfect Channel State Information at the Transmitter
— The search for optimality in the design of channel precoders and training symbols in block processing communication systems is one of paramount importance. Finding the best tra...
Chitaranjan P. Sukumar, Ricardo Merched, Ahmed M. ...
ICC
2007
IEEE
102views Communications» more  ICC 2007»
15 years 4 months ago
Decentralized Interference Aware Link Adaptation Using Busy Bursts
— This paper presents a new cross-layer approach to achieve active link adaptation and QoS support in ad hoc networks. Upon data reception in a transmission slot, receivers broad...
Alexander Tyrrell, Harald Haas, Gunther Auer, Pete...
77
Voted
INFOCOM
1998
IEEE
15 years 2 months ago
An End-to-End Reliable Multicast Protocol Using Polling for Scaleability
Reliable sender-based one-to-many protocols do not scale well due mainly to implosion caused by excessive rate of feedback packets arriving from receivers. We show that this probl...
Marinho P. Barcellos, Paul D. Ezhilchelvan
NOMS
2010
IEEE
222views Communications» more  NOMS 2010»
14 years 8 months ago
Bayesian decision aggregation in collaborative intrusion detection networks
—Cooperation between intrusion detection systems (IDSs) allows collective information and experience from a network of IDSs to be shared to improve the accuracy of detection. A c...
Carol J. Fung, Quanyan Zhu, Raouf Boutaba, Tamer B...
CCS
2011
ACM
13 years 10 months ago
Cirripede: circumvention infrastructure using router redirection with plausible deniability
Many users face surveillance of their Internet communications and a significant fraction suffer from outright blocking of certain destinations. Anonymous communication systems a...
Amir Houmansadr, Giang T. K. Nguyen, Matthew Caesa...