Sciweavers

132 search results - page 12 / 27
» Unconditionally reliable message transmission in directed ne...
Sort
View
ESORICS
2007
Springer
15 years 4 months ago
Cloak: A Ten-Fold Way for Reliable Covert Communications
A number of network covert channels have been proposed recently that may have important ramifications for Internet security and privacy. However, they could become ineffective in...
Xiapu Luo, Edmond W. W. Chan, Rocky K. C. Chang
JSAC
2007
87views more  JSAC 2007»
14 years 9 months ago
Hidden-Action in Network Routing
— In communication networks, such as the Internet or mobile ad-hoc networks, the actions taken by intermediate nodes or links are typically hidden from the communicating endpoint...
Michal Feldman, John Chuang, Ion Stoica, Scott She...
GLOBECOM
2009
IEEE
15 years 1 months ago
CoRe-MAC: A MAC-Protocol for Cooperative Relaying in Wireless Networks
Cooperative relaying methods can improve wireless links, but introduce overhead due to relay selection and resource reservation compared to non-cooperative transmission. In order t...
Helmut Adam, Wilfried Elmenreich, Christian Bettst...
TWC
2008
127views more  TWC 2008»
14 years 9 months ago
Distributed beamforming and power allocation for cooperative networks
Cooperative diversity systems rely on using relay nodes to relay copies of transmitted information to the destination such that each copy experiences different channel fading, henc...
Zhiguo Ding, Woon Hau Chin, Kin K. Leung
JCM
2010
126views more  JCM 2010»
14 years 8 months ago
Adding Redundancy to Replication in Window-aware Delay-tolerant Routing
— This paper presents a resource-efficient protocol for opportunistic routing in delay-tolerant networks (DTN). First, our approach exploits the context of mobile nodes (speed, ...
Gabriel Sandulescu, Simin Nadjm-Tehrani