Sciweavers

183 search results - page 22 / 37
» Stochastic Modelling of Communication Protocols from Source ...
Sort
View
IADIS
2003
15 years 1 months ago
Informatization and E-Business Model Application for Distributed Data Mining Using Mobile Agents
Distributed data mining (DDM) is the semi-automatic pattern extraction of distributed data sources. The next generation of the data mining studies will be distributed data mining ...
Ezendu Ifeanyi Ariwa, Mohamed B. Senousy, Mohamed ...
INFOCOM
2009
IEEE
15 years 6 months ago
On the Market Power of Network Coding in P2P Content Distribution Systems
Abstract—Network coding is emerging as a promising alternative to traditional content distribution approaches in P2P networks. By allowing information mixture in peers, it simpli...
Xinyu Zhang, Baochun Li
CISC
2005
Springer
169views Cryptology» more  CISC 2005»
15 years 5 months ago
On Bluetooth Repairing: Key Agreement Based on Symmetric-Key Cryptography
Abstract. Despite many good (secure) key agreement protocols based on publickey cryptography exist, secure associations between two wireless devices are often established using sym...
Serge Vaudenay
INFOCOM
2010
IEEE
14 years 10 months ago
Optimal SINR-based Random Access
— Random access protocols, such as Aloha, are commonly modeled in wireless ad-hoc networks by using the protocol model. However, it is well-known that the protocol model is not a...
Amir Hamed Mohsenian Rad, Vincent W. S. Wong, Robe...
GLOBECOM
2009
IEEE
15 years 3 months ago
Dual-Hop Adaptive Packet Transmission with Regenerative Relaying for Wireless TDD Systems
We consider the design and performance analysis of adaptive modulation and coding (AMC) applied to regenerative dual-hop transmission systems, where a source node communicates with...
Andreas Muller, Hong-Chuan Yang