Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
network capacity
biblio
HIDE: AP-Assisted Broadcast Traffic Management to Save Smartphone Energy
Submitted by el_wehby on Fri, 05/25/2018 - 2:47pm
Power demand
wireless LAN
WiFi energy consumption
WiFi broadcast frames
Unicast
trace-driven simulation
telecommunication traffic
telecommunication power management
suspend mode
smartphone energy saving
smart phones
Protocols
AP-assisted broadcast traffic management
Ports (Computers)
packet round-trip time
Nexus One
network capacity
IEEE 802.11 Standard
high power active mode
HIDE system
energy consumption
energy conservation
computer network management
Central Processing Unit
1536086
biblio
On the Probability of Finding a Receiver in an Ellipsoid Neighborhood of a Sender in 3D Random UANs
Submitted by K_Hooper on Wed, 09/27/2017 - 12:19pm
acoustic coupling
Human behavior
network capacity
pubcrawl
Resiliency
scalabilty
underwater acoustic network
underwater communication
biblio
Network Codes Resilient to Jamming and Eavesdropping
Submitted by BrandonB on Fri, 05/01/2015 - 7:34am
network capacity
Vectors
Transforms
source rate
secrecy
Robustness
rate-optimal
random linear network coding
random codes
polynomial-time distributed network codes
network coding
Achievable rates
malicious errors
linear codes
Jamming
interior nodes
error probability
error control
eavesdropping
communicating information
communicated message
adversary
biblio
Network Codes Resilient to Jamming and Eavesdropping
Submitted by BrandonB on Thu, 04/30/2015 - 11:45am
network capacity
Vectors
Transforms
source rate
secrecy
Robustness
rate-optimal
random linear network coding
random codes
polynomial-time distributed network codes
network coding
Achievable rates
malicious errors
linear codes
Jamming
interior nodes
error probability
error control
eavesdropping
communicating information
communicated message
adversary