Sciweavers

448 search results - page 48 / 90
» k-anonymous message transmission
Sort
View
ICPPW
2003
IEEE
15 years 3 months ago
Perfect Secrecy in Wireless Networks
In a classic paper, among a multitude of other security issues, Claude E. Shannon defined perfect secrecy for a pair of secure computers communicating over an insecure link. The ...
Phillip G. Bradford, Olga V. Gavrylyako, Randy K. ...
INFOCOM
2003
IEEE
15 years 3 months ago
Localized minimum-energy broadcasting in ad-hoc networks
— In the minimum energy broadcasting problem, each node can adjust its transmission power in order to minimize total energy consumption but still enable a message originated from...
Julien Cartigny, David Simplot, Ivan Stojmenovic
NSDI
2008
15 years 11 days ago
Efficiency Through Eavesdropping: Link-layer Packet Caching
The broadcast nature of wireless networks is the source of both their utility and much of their complexity. To turn what would otherwise be unwanted interference into an advantage...
Mikhail Afanasyev, David G. Andersen, Alex C. Snoe...
ECIS
2003
14 years 11 months ago
Earning m-oney - a situation based approach for mobile business models
Current mobile business models for mobile commerce do not seem promising with regard to substantial revenue streams for mobile network operators as well as mobile service provider...
Stefan Figge, Gregor Schrott, Jan Muntermann, Kai ...
CORR
2008
Springer
126views Education» more  CORR 2008»
14 years 10 months ago
Interference Channels with Correlated Receiver Side Information
The problem of joint source-channel coding in transmitting independent sources over interference channels with correlated receiver side information is studied. When each receiver ...
Nan Liu, Deniz Gündüz, Andrea J. Goldsmi...