Skip to Main Content Area
  • CPS-VO
    • Contact Support
  • Browse
    • Calendar
    • Announcements
    • Repositories
    • Groups
  • Search
    • Search for Content
    • Search for a Group
    • Search for People
    • Search for a Project
    • Tagcloud
      
 
Not a member?
Click here to register!
Forgot username or password?
 
Home
National Science Foundation

Cyber-Physical Systems Virtual Organization

Read-only archive of site from September 29, 2023.

CPS-VO

source nodes

biblio

Visible to the public LDPC-based Joint Source-Channel-Network Coding for the Multiple Access Relay Channel

Submitted by aekwall on Mon, 11/25/2019 - 2:06pm
  • Markov sources
  • Joint Source Channel Network scheme
  • JSCN coding
  • LDPC channel code
  • LDPC codes
  • LDPC source code
  • LDPC-based joint source-channel-network coding
  • MARC setup
  • MARC system
  • Joint Source Channel Network LDPC codes
  • multiple access relay channel
  • noise figure 5.0 dB
  • source coding
  • source data
  • source nodes
  • sources-relay data
  • sources-relay links
  • Markov processes
  • pubcrawl
  • composability
  • Metrics
  • Decoding
  • channel coding
  • iterative decoding
  • parity check codes
  • Relays
  • Resiliency
  • combined source-channel coding
  • network coding
  • compressed symbols
  • conventional LDPC code
  • decoding scheme
  • destination nodes
  • iterative joint decoding algorithm
biblio

Visible to the public A review of black-hole attack mitigation techniques and its drawbacks in Mobile Ad-hoc Network

Submitted by grigby1 on Wed, 06/20/2018 - 12:42pm
  • Resiliency
  • mobile ad-hoc network
  • movables nodes
  • multihop communication
  • overhearing
  • Peer-to-peer computing
  • protocol
  • pubcrawl
  • resilience
  • mobile ad hoc networks
  • Routing
  • Routing protocols
  • sequence number
  • source nodes
  • telecommunication security
  • telecommunication traffic
  • wireless networking field
  • AODV
  • Metrics
  • MANET
  • IDS
  • high destination sequence number
  • destination nodes
  • delays
  • data packets
  • cross checking
  • Conferences
  • Compositionality
  • clustering
  • byzantine attacks
  • Blackhole
  • black-hole attack mitigation techniques
  • attack mitigation

Terms of Use  |  ©2023. CPS-VO