Sciweavers

425 search results - page 18 / 85
» The ENTRAPID Protocol Development Environment
Sort
View
89
Voted
JAMIA
2011
68views more  JAMIA 2011»
14 years 3 months ago
A secure protocol for protecting the identity of providers when disclosing data for disease surveillance
Background Providers have been reluctant to disclose patient data for public-health purposes. Even if patient privacy is ensured, the desire to protect provider confidentiality h...
Khaled El Emam, Jun Hu, Jay Mercer, Liam Peyton, M...
118
Voted
CORR
2008
Springer
124views Education» more  CORR 2008»
15 years 16 days ago
High Performance Cooperative Transmission Protocols Based on Multiuser Detection and Network Coding
Abstract--Cooperative transmission is an emerging communication technique that takes advantage of the broadcast nature of wireless channels. However, due to low spectral efficiency...
Zhu Han, Xin Zhang, H. Vincent Poor
106
Voted
NAS
2010
IEEE
14 years 10 months ago
A Probabilistic Routing Protocol for Heterogeneous Sensor Networks
The past five years witnessed a rapid development in wireless sensor networks, which have been widely used in military and civilian applications. Due to different requirements in t...
Yuefei Hu, Wenzhong Li, Xiao Chen, Xin Chen, Sangl...
84
Voted
SIGMOBILE
2008
98views more  SIGMOBILE 2008»
15 years 10 days ago
TraNS: realistic joint traffic and network simulator for VANETs
Realistic simulation is a necessary tool for proper evaluation of newly developed protocols for Vehicular Ad Hoc Networks (VANETs). Several recent efforts focused on achieving thi...
Michal Piórkowski, Maxim Raya, A. Lezama Lu...
CORR
2010
Springer
153views Education» more  CORR 2010»
15 years 16 days ago
Secured Greedy Perimeter Stateless Routing for Wireless Sensor Networks
Wireless sensor networks are collections of large number of sensor nodes. The sensor nodes are featured with limited energy, computation and transmission power. Each node in the n...
P. Samundiswary, D. Sathian, P. Dananjayan