Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
network capacity
biblio
HIDE: AP-Assisted Broadcast Traffic Management to Save Smartphone Energy
Submitted by el_wehby on Fri, 05/25/2018 - 2:47pm
AP-assisted broadcast traffic management
Central Processing Unit
computer network management
energy conservation
energy consumption
HIDE system
high power active mode
IEEE 802.11 Standard
network capacity
Nexus One
packet round-trip time
Ports (Computers)
Power demand
Protocols
smart phones
smartphone energy saving
suspend mode
telecommunication power management
telecommunication traffic
trace-driven simulation
Unicast
WiFi broadcast frames
WiFi energy consumption
wireless LAN
1536086
biblio
On the Probability of Finding a Receiver in an Ellipsoid Neighborhood of a Sender in 3D Random UANs
Submitted by K_Hooper on Wed, 09/27/2017 - 12:19pm
acoustic coupling
Human behavior
network capacity
pubcrawl
Resiliency
scalabilty
underwater acoustic network
underwater communication
biblio
Network Codes Resilient to Jamming and Eavesdropping
Submitted by BrandonB on Fri, 05/01/2015 - 7:34am
Achievable rates
adversary
communicated message
communicating information
eavesdropping
error control
error probability
interior nodes
Jamming
linear codes
malicious errors
network capacity
network coding
polynomial-time distributed network codes
random codes
random linear network coding
rate-optimal
Robustness
secrecy
source rate
Transforms
Vectors
biblio
Network Codes Resilient to Jamming and Eavesdropping
Submitted by BrandonB on Thu, 04/30/2015 - 11:45am
Achievable rates
adversary
communicated message
communicating information
eavesdropping
error control
error probability
interior nodes
Jamming
linear codes
malicious errors
network capacity
network coding
polynomial-time distributed network codes
random codes
random linear network coding
rate-optimal
Robustness
secrecy
source rate
Transforms
Vectors