Báo cáo hóa học: " Research Article Efficient Zero-Knowledge Watermark Detection with Improved Robustness to Sensitivity Attacks" potx

Báo cáo hóa học: "Research Article Efficient MAC Protocol for Subcarrier-Wise Rate Adaptation over WLAN" potx

Báo cáo hóa học: "Research Article Efficient MAC Protocol for Subcarrier-Wise Rate Adaptation over WLAN" potx

... receiver, a sender sends an RTS packet with “Reserved” subfield set to 1. Receiving the RTS packet with “Reserved” subfield set to 1, if the receiver is a node with the proposed rate adaptation capability, ... symbol to 1 to increase or -1 to decrease the data rate on each subcarrier. If the decision of a subcarrier is not to change the data rate, the receiver sets the Bit-Map...

Ngày tải lên: 21/06/2014, 17:20

9 274 0
Báo cáo hóa học: " Research Article Efficient Zero-Knowledge Watermark Detection with Improved Robustness to Sensitivity Attacks" potx

Báo cáo hóa học: " Research Article Efficient Zero-Knowledge Watermark Detection with Improved Robustness to Sensitivity Attacks" potx

... 2007, Article ID 45731, 14 pages doi:10.1155/2007/45731 Research Article Efficient Zero-Knowledge Watermark Detection with Improved Robustness to Sensitivity Attacks Juan Ram ´ on Troncoso-Pastoriza ... approach, zero-knowledge watermarking, makes use of zero-knowledge (ZK) protocols [1]inorderto get a secure communication layer over a pre-existent sym- metric proto...

Ngày tải lên: 21/06/2014, 22:20

14 318 0
Báo cáo hóa học: "Research Article Efficient Scheduling of Pigeons for a Constrained Delay Tolerant Application" potx

Báo cáo hóa học: "Research Article Efficient Scheduling of Pigeons for a Constrained Delay Tolerant Application" potx

... hastobetimetolerantdue to the long time (compared with instant communications) needed by the travel of pigeons, the delay that can be tolerated is still limited. For example, the best time to rescuing ... sites according to the shortest tour to pick up their messages. 3.1. Basic Scenario—A Single Pickup Point. To facilitate the analysis and get better insight, a simpler scenario...

Ngày tải lên: 21/06/2014, 23:20

7 255 0
Báo cáo hóa học: " Research Article Efficient Delay Tracking Methods with Sidelobes Cancellation for BOC-Modulated Signals" potx

Báo cáo hóa học: " Research Article Efficient Delay Tracking Methods with Sidelobes Cancellation for BOC-Modulated Signals" potx

... and studied: SCM with interference cancellation (IC), SCM with narrow correlator, SCM with high-resolution correlator (HRC), SCM with differential correlation (DC), and SCM with threshold. Compared to other ... set to 0.5here)oruntil Hindawi Publishing Corporation EURASIP Journal on Wireless Communications and Networking Volume 2007, Article ID 72626, 20 pages doi:10.1155/2007/...

Ngày tải lên: 22/06/2014, 19:20

20 341 0
Báo cáo hóa học: " Research Article Efficient Data Association in Visual Sensor Networks with Missing Detection" ppt

Báo cáo hóa học: " Research Article Efficient Data Association in Visual Sensor Networks with Missing Detection" ppt

... 2011, Article ID 176026, 25 pages doi:10.1155/2011/176026 Research Article Efficient Data Association in Visual Sensor Networks with Missing Detection Jiuqing Wan and Qing yun Liu Department of Automation, ... in case of missing detection. Firstly, to deal with the problem of missing detection, we introduce a set of random variables, namely routine variables, into the DBN mod...

Ngày tải lên: 21/06/2014, 05:20

25 374 0
Báo cáo hóa học: " Research Article Efficient Dispersion Generation Structures for Spring Reverb Emulation" ppt

Báo cáo hóa học: " Research Article Efficient Dispersion Generation Structures for Spring Reverb Emulation" ppt

... the rest of the structure without degradation of sound quality. To avoid the overhead associated with an arbitrary change in sampling rate, it is best to downsample to a rate which is an integer ... algorithm to produce the spring reverberation effect. It consists of two parallel delay lines with feedback, with an appropriately designed spectral delay filter placed within each fee...

Ngày tải lên: 21/06/2014, 05:20

8 474 0
Báo cáo hóa học: " Research Article Efficient Compensation of Transmitter and Receiver IQ Imbalance in OFDM Systems" pptx

Báo cáo hóa học: " Research Article Efficient Compensation of Transmitter and Receiver IQ Imbalance in OFDM Systems" pptx

... equation:  S tot [ l ] =   B tot [l]  Q t tot [l]  −1     D tot [l] Z tot [ l ] , (20) where  Q t tot [l]and  B tot [l] are the estimates of Q t tot [l]and B tot [l]. We will refer to the ... is then obtained as  S tot [ l ] =  B r tot [ l ]  Q r inv tot [ l ] Q r tot [ l ] ×B tot [ l ] Q t tot [ l ]  Q t inv tot [ l ] S tot [ l ] , (38) where  Q t inv tot [l] =  1 −  Q t...

Ngày tải lên: 21/06/2014, 08:20

14 383 0
Báo cáo hóa học: " Research Article Efficient Uplink Modeling for Dynamic System-Level Simulations of Cellular and Mobile Networks" ppt

Báo cáo hóa học: " Research Article Efficient Uplink Modeling for Dynamic System-Level Simulations of Cellular and Mobile Networks" ppt

... simulators which is capable of making very long SON simulations with the necessary level of accuracy. It can be understood as a smart extension of snapshot- based tools with a time axis and with ... moving with a speed of 3 km/h, and they are handover to another cell if the received signal strength (measured on downlink reference signals) with respect to the new cell is 3 dB bet...

Ngày tải lên: 21/06/2014, 11:20

15 388 0
Báo cáo hóa học: " Research Article Efficient Key Agreements in Dynamic Multicast Height Balanced Tree for Secure Multicast Communications in Ad Hoc Networks" doc

Báo cáo hóa học: " Research Article Efficient Key Agreements in Dynamic Multicast Height Balanced Tree for Secure Multicast Communications in Ad Hoc Networks" doc

... The ECDH with 160-bit key lengths provides the same security le vel to a 1024-bit DH secret sharing protocol [15, 16]. However, the original DH protocol needs a key of at least 1024 bits to achieve ... agreement protocol, using elliptic curve cryptography that allows two parties to estab- lish a shared secret key (session key) over an insecure chan- nel. Two parties then exploit this...

Ngày tải lên: 21/06/2014, 11:20

15 324 0
Báo cáo hóa học: " Research Article Efficient Public Key Certificate Management for Mobile Ad Hoc Networks" potx

Báo cáo hóa học: " Research Article Efficient Public Key Certificate Management for Mobile Ad Hoc Networks" potx

... a node in the network B wishes to communicate with one of his peers A, he should contact with t +1 servers in advance in order to obtain A’s public key signed with the CA’s secret key. One of ... verification procedure. Our immediate goal is to adapt the developed imple- mentation to a network simulator in order to evaluate the behaviour of the method with different mobility m...

Ngày tải lên: 21/06/2014, 11:20

10 319 0
Từ khóa:
w