Sciweavers

146 search results - page 18 / 30
» Supporting multiple protection strategies in optical network...
Sort
View
INFOCOM
2006
IEEE
15 years 5 months ago
Session Privacy Enhancement by Traffic Dispersion
— Traditional network routing uses the single (shortest) path paradigm. This paradigm leaves the session vulnerable to a variety of security threats, such as eavesdropping. We pr...
Haim Zlatokrilov, Hanoch Levy
AINA
2008
IEEE
15 years 5 months ago
Adaptive QoS-Aware Resource Management in Heterogeneous Wireless Networks
The integration of different IP-based wireless networks, such as WiMAX and WiFi, becomes a 2-tier heterogeneous wireless networks is a more and more popular issue. In order to supp...
I-Shyan Hwang, Bor-Jiunn Hwang, K. Robert Lai, Lin...
ECCV
2010
Springer
15 years 3 months ago
Analyzing Depth from Coded Aperture Sets
Computational depth estimation is a central task in computer vision and graphics. A large variety of strategies have been introduced in the past relying on viewpoint variations, de...
TSP
2008
119views more  TSP 2008»
14 years 11 months ago
MIMO Relaying With Linear Processing for Multiuser Transmission in Fixed Relay Networks
In this paper, a novel relaying strategy that uses multiple input multiple output (MIMO) fixed relays with linear processing to support multiuser transmission in cellular networks...
Chan-Byoung Chae, Taiwen Tang, Robert W. Heath Jr....
VTC
2008
IEEE
112views Communications» more  VTC 2008»
15 years 5 months ago
Theoretical Analysis of Saturation Throughput in MU-DCF
Abstract—In this paper, the calculation of saturation throughput for previously proposed Multi-User - Distributed Coordination Function (MU-DCF) is presented. MU-DCF is an IEEE 8...
Jelena Mirkovic, Bernhard Walke