Sciweavers

448 search results - page 39 / 90
» k-anonymous message transmission
Sort
View
IJNSEC
2006
80views more  IJNSEC 2006»
14 years 10 months ago
Authenticated Access to Reserved Network Resources
Enhanced network services often involve preferential allocation of resources such as transmission capacity ("bandwidth") and buffer space to packets belonging to certain...
Kenneth L. Calvert, Srinivasan Venkatraman, Jim Gr...
JSAC
2007
87views more  JSAC 2007»
14 years 10 months ago
Hidden-Action in Network Routing
— In communication networks, such as the Internet or mobile ad-hoc networks, the actions taken by intermediate nodes or links are typically hidden from the communicating endpoint...
Michal Feldman, John Chuang, Ion Stoica, Scott She...
IJAHUC
2010
130views more  IJAHUC 2010»
14 years 8 months ago
Secure traffic data propagation in Vehicular Ad Hoc Networks
: In vehicular ad hoc network, vehicles can share traffic/emergency information. The information should not be modified/manipulated during transmission without detection. We pres...
Baber Aslam, Soyoung Park, Cliff Changchun Zou, Da...
MASS
2010
161views Communications» more  MASS 2010»
14 years 4 months ago
Mode switch - Adaptive use of delay-sensitive or energy-aware communication in IEEE 802.15.4-based networks
Abstract--We propose "mode switch", an adaptive loadsensitive solution that supports both an energy-efficient operation mode for transmitting normal sensor data and an Qo...
Feng Chen, Xiaoyu Tong, Edith Ngar, Falko Dressler
TWC
2010
14 years 4 months ago
Distributed consensus-based demodulation: algorithms and error analysis
This paper deals with distributed demodulation of space-time transmissions of a common message from a multiantenna access point (AP) to a wireless sensor network. Based on local me...
Hao Zhu, Alfonso Cano, Georgios B. Giannakis