Sciweavers

30 search results - page 4 / 6
» cic 2006
Sort
View
CIC
2006
114views Communications» more  CIC 2006»
14 years 11 months ago
Tree Based Conference Key Establishment Cost Analysis and Minimization in Heterogeneous Networks
A shared secret, conference key, must be established among members to securely communicate among them. The Diffie-Hellman is often used for the conference key establishment. In a ...
Zhan Liu, Mi Lu
CIC
2006
103views Communications» more  CIC 2006»
14 years 11 months ago
Performance Analysis of Punctured Turbo Code under An AWGN Channel
Turbo code is a coding technique that enhances a reliable data transmission. Because of special structure of encoder and iterative decoder, it could obtain 1dB at low EbN0 db that...
Ya-Fen Chen, Cheng-Ying Yang
CIC
2006
102views Communications» more  CIC 2006»
14 years 11 months ago
On-line Algorithm for Server Selection of Video Streaming over P2P Networks
We consider a video streaming application over P2P networks and introduce the P2P on-line server selection problem. This task is related to the classic K-server problem, known fro...
Hao Wang, Andras Farago
CIC
2006
141views Communications» more  CIC 2006»
14 years 11 months ago
Towards the Integration of Reliability and Traffic Engineering
The main goal of this paper is to make a step towards the development of a unified approach that incorporates both reliability and traffic engineering aspects into a common, unifie...
Andras Farago
CIC
2006
184views Communications» more  CIC 2006»
14 years 11 months ago
A Data Replication Scheme based on Primary Copy for Ensuring Data Consistency in Mobile Ad hoc Networks
Abstract - A mobile ad hoc network (MANET) is a multihop wireless network capable of autonomous operations. Since MANET causes frequent network partitions, a data replication is co...
Aekyung Moon, Han Namgoong, Hyoungsun Kim, Hyun Ki...