Results 41 to 50 of about 71,366 (205)

A Network Coding Approach to Loss Tomography [PDF]

open access: yes, 2013
Network tomography aims at inferring internal network characteristics based on measurements at the edge of the network. In loss tomography, in particular, the characteristic of interest is the loss rate of individual links and multicast and/or unicast ...
Fragouli, Christina   +3 more
core   +3 more sources

Evaluation of multi‐user multiple‐input multiple‐output digital beamforming algorithms in B5G/6G low Earth orbit satellite systems

open access: yesInternational Journal of Satellite Communications and Networking, Volume 44, Issue 1, Page 17-33, January/February 2026.
In this paper, we investigate the application of signal‐to‐leakage‐plus‐noise ratio (SLNR) beamforming to low Earth orbit non‐terrestrial networks. The SLNR criterion aims at maximizing the received desired signal power for each user while minimizing the overall interference power caused by each user to all other co‐channel receivers. We show that such
M. Rabih Dakkak   +3 more
wiley   +1 more source

Scheduling of Multicast and Unicast Services under Limited Feedback by using Rateless Codes

open access: yes, 2014
Many opportunistic scheduling techniques are impractical because they require accurate channel state information (CSI) at the transmitter. In this paper, we investigate the scheduling of unicast and multicast services in a downlink network with a very ...
Kim, Kyu-Han   +3 more
core   +1 more source

SKE2SG: A Secure Key Establishment Scheme for Smart Grid Cyber‐Physical Systems Based on Elliptic Curve Cryptography

open access: yesIET Cyber-Physical Systems: Theory &Applications, Volume 11, Issue 1, January/December 2026.
Recent proposals by Mahmood et al., Braeken et al., and Chaudhry et al. aimed at establishing secure communication in AMI, asserting their methods fulfil the requisite security criteria. This paper, however, reveals that each of these proposals exhibits security vulnerabilities and lacks sufficient features for deployment.
Ahmad Rahdari, Bahareh Akhbari
wiley   +1 more source

A performance model of multicast communication in wormhole-routed networks on-chip [PDF]

open access: yes, 2009
Collective communication operations form a part of overall traffic in most applications running on platforms employing direct interconnection networks. This paper presents a novel analytical model to compute communication latency of multicast as a widely
Moadeli, Mahmoud, Vanderbauwhede, Wim
core   +1 more source

Quantum Key Distribution Networks Design: Overview and Challenges

open access: yesIET Quantum Communication, Volume 7, Issue 1, January/December 2026.
This paper explores the potential of using established QKD network design techniques in the context of quantum key distribution, which is based on the principles of quantum mechanics. ABSTRACT Quantum cryptography has increasingly attracted interest from both industry and academia for its potential in real‐world applications.
Pankaj Kumar   +2 more
wiley   +1 more source

A SURVEY ON MULTICAST ROUTING PROTOCOLS FOR PERFORMANCE EVALUATION IN WIRELESS SENSOR NETWORK [PDF]

open access: yesICTACT Journal on Communication Technology, 2015
Multicast is a process used to transfer same message to multiple receivers at the same time. This paper presents the simulation and analysis of the performance of six different multicast routing protocols for Wireless Sensor Network (WSN).
A. Suruliandi, T. Sampradeepraj
doaj  

Joint 2‐D LFM Modulation and Mismatched Filter Design in Dual‐Function Radar‐Communication System

open access: yesIET Radar, Sonar &Navigation, Volume 20, Issue 1, January/December 2026.
This paper proposes a joint 2‐D LFM modulation and mismatched filtering design for military‐grade dual‐function radar‐communication systems. The novel scheme modulates data onto both the initial frequency and chirp rate of LFM pulses, boosting data rates whilst preserving the constant‐envelope property critical for high‐power transmission.
Kehao Wang   +5 more
wiley   +1 more source

On the Capacity Bounds of Undirected Networks

open access: yes, 2008
In this work we improve on the bounds presented by Li&Li for network coding gain in the undirected case. A tightened bound for the undirected multicast problem with three terminals is derived.
Al-Bashabsheh, Ali, Yongacoglu, Abbas
core   +1 more source

A Systematic Review of VANET Routing Protocols for Intelligent Transport Systems (ITSs)

open access: yesJournal of Advanced Transportation, Volume 2026, Issue 1, 2026.
The swift improvement of wireless communication technology has aided the creation of vehicular ad hoc networks (VANETs) as a revolutionary option for the realization of intelligent transportation systems (ITSs). VANETs facilitate seamless communication between vehicles and infrastructure (V2I) and among the vehicles themselves (V2V). These networks can
Roopa Tirumalasetti   +4 more
wiley   +1 more source

Home - About - Disclaimer - Privacy