نتایج جستجو برای: information channel
تعداد نتایج: 1346545 فیلتر نتایج به سال:
multicast routing is one of the most important services in multi radio multi channel (mrmc) wireless mesh networks (wmn). multicast routing performance in wmns could be improved by choosing the best routes and the routes that have minimum interference to reach multicast receivers. in this paper we want to address the multicast routing problem for a given channel assignment in wmns. the channels...
many appealing multicast services such as on-demand tv, teleconference, online games and etc. can benefit from high available bandwidth in multi-radio multi-channel wireless mesh networks. when multiple simultaneous transmissions use a similar channel to transmit data packets, network performance degrades to a large extant. designing a good multicast tree to route data packets could enhance the...
The wiretap channel put forward by Wyner for many years. In this paper, we consider the situation that the wiretapper can not only view the channel output via a second noisy channel, but also can get some side information about the codeword that transmitted in the main noisy channel. The designer tries to build the encoder-decoder in such a way as to maximize the transmission rate R, and the eq...
In this paper, we study the state-dependent two-user interference channel, where the state information is noncausally known at both transmitters but unknown to either of the receivers. We first propose two coding schemes for the discrete memoryless case: simultaneous encoding for the sub-messages in the first one and superposition encoding in the second one, both with rate splitting and Gel’fan...
The applications of the general formulae of channel capacity developed in the quantum information theory to evaluation of information transmission capacity of optical channel are interesting subjects. In this review paper, we will point out that the formulation based on only classicalquantum channel mapping model may be inadequate when one takes into account a power constraint for noisy channel...
Information systems in the context of retailing are, though often overlooked as such, some of the most complex systems in the corporate information landscape – this solely on the basis of their geographical and probably also cultural span across nations, traditions, fiscal systems and workforce regimes (Joshi, 2009; Tambo, 2011). When retail information systems are expanded into being able to c...
Authentication based on cryptographic protocols is a key technology for recent security systems. However, the so-called relay attack where a malicious attacker tries to assume the role of the prover, is known to be a serious threat even for the cryptographically-secure authentication systems. This paper proposes a new authentication method that utilizes the side channel that already exists in m...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید