The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The Radio Resource Control (RRC) state machine has been widely studied to improve application performance and reduce the energy consumption of smart phones. We observe that even a smart phone remains in the RRC state, there may still exist some significant performance change if it simultaneously carry on voice and data services. For example, the Round Trip Time (RTT) will get larger when a voice call...
This paper investigates bidirectional relaying with direct link, where two sources exchange data via a relay node using an amplify-and-forward (AF) protocol. Two power allocation strategies are proposed under Rayleigh fading channels. One scheme aims to improve average sum-rate and the other is to decrease sum-symbol error rate (SER). Numerical results have indicated significant performance gain over...
In Wireless Sensor Networks (WSNs), stochastic reliable transmission protocols, which improve reliability of the delivery process by transmitting redundant packets, have been proved to have advantage of energy efficiency over the retransmission one. But the burst and deep fading characteristic of the error prone wireless links in WSNs reduces the practicability of this kind of protocols. To solve...
This paper is to solve the problems of the new users' registration to PKG (Private Key Generator) and how PKG distribute private keys to the new users safely. After the research of current IBC system, we propose a solution to deal with the problems. We subjoin a user' private master key using authentication message, by which users can validate the registration information and use IBE to encrypt some...
This paper investigates a spectrum-efficient cooperative diversity method based on butterfly network, which endows that a relay can encode the data received from two users and then forward the coded data to destination. Under the assumption that the relay can reliably overhear the data from two users, we discuss the outage probability and diversity gain. Moreover, the outage probability and diversity...
Large-scale storage systems may service millions of clients. Effectively identifying and authenticating these clients can not only prevent illegal accesses but also eliminate unnecessary redundancies of access control. However, existing security solutions have largely ignored the identification and authentication issues or separately consider them from access control mechanisms. As a result, these...
Simulation is an important approach to evaluate protocols. Realistic simulations lead to accurate evaluations. However, most of evaluations in VANET recently were still using MAN.ET mobility models or MANET models with a map bounder. Existing VANET mobility models, which treat all nodes identical, cannot reach most researchers' demand. In this paper, we develop a role based mobility model for VANET...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.