Sciweavers

448 search results - page 38 / 90
» k-anonymous message transmission
Sort
View
SACI
2007
IEEE
15 years 4 months ago
Implementation of an Authentication Protocol for Sending Audio-Video Information in Java
— an application for assuring the authenticity of audio-video information is developed. The application is implemented in Java by using Java Media Framework to send audio and vid...
Bogdan Groza, Dorina Petrica, Simona Barbu, Marian...
UIC
2007
Springer
15 years 4 months ago
Mesh-Based Sensor Relocation for Coverage Maintenance in Mobile Sensor Networks
Abstract. Sensor relocation protocols can be employed as fault tolerance approach to offset the coverage loss caused by node failures. We introduce a novel localized structure, in...
Xu Li, Nicola Santoro, Ivan Stojmenovic
MOBIQUITOUS
2005
IEEE
15 years 3 months ago
Content-Based Routing in Mobile Ad Hoc Networks
The publish/subscribe model of communication provides sender/receiver decoupling and selective information dissemination that is appropriate for mobile environments characterized ...
Milenko Petrovic, Vinod Muthusamy, Hans-Arno Jacob...
INFOCOM
1992
IEEE
15 years 2 months ago
A Study on the Inaccessibility Characteristics of ISO 8802/4 Token-Bus LANs
Local area networks have long been established as the basis for distributed systems. Continuity of service and bounded and known message delivery latency are requirements of a num...
José Rufino, Paulo Veríssimo
ETT
2008
100views Education» more  ETT 2008»
14 years 10 months ago
On the capacity of interference channels with one cooperating transmitter
Inner and outer bounds are established on the capacity region of two-sender, two-receiver interference channels where one transmitter knows both messages. The transmitter with extr...
Ivana Maric, Andrea J. Goldsmith, Gerhard Kramer, ...