Low-complexity energy-efficient broadcasting in wireless ad-hoc networks using network coding
Related publications (90)
Graph Chatbot
Chat with Graph Search
Ask any question about EPFL courses, lectures, exercises, research, news, etc. or try the example questions below.
DISCLAIMER: The Graph Chatbot is not programmed to provide explicit or categorical answers to your questions. Rather, it transforms your questions into API requests that are distributed across the various IT services officially administered by EPFL. Its purpose is solely to collect and recommend relevant references to content that you can explore to help you answer your questions.
This study addresses the problem of profit maximization between wireless service providers (WSPs) and content providers (CPs) in wireless broadcasting systems, while simultaneously providing high quality of experience for end-users (EUs). We first study th ...
Activity recognition has been a research field of high interest over the last years, and it finds application in the medical domain, as well as personal healthcare monitoring during daily home- and sports-activities. With the aim of producing minimum disco ...
Wireless communication relies on high-frequency signal transmission between communication nodes. The signals are at the same time the message and the infrastructure for communication. Questioning the current wireless signals space occupancy in a playful wa ...
While every network node only relays messages in a traditional communication system, the recent network coding (NC) paradigm proposes to implement simple in-network processing with packet combinations in the nodes. NC extends the concept of "encoding" a me ...
This work studies how to build wireless network protocols that achieve better reliability, lower delay and higher throughput than existing alternatives by using network coding and by exploiting the broadcast nature of the wireless channel. In the first par ...
The method of the invention, comprising at the user side: a) checking if the load of a first gateway to which a user terminal device is wirelessly connected, falls below a given low load threshold; b) if said first gateway load has fallen below said given ...
We investigate the problem of exchanging a se- cret key within a group of wireless devices. In particular, we are interested in information theoretically secure key exchange schemes that enable honest nodes of a multi-hop network to establish a secret grou ...
Current security systems often rely on the adversary's computational limitations. Wireless networks offer the opportunity for a different, complementary kind of security, which relies on the adversary's limited network presence (i.e., that the adversary ca ...
In this paper, we formulate a delay-power control (DPC) scheme for wireless networking, which efficiently balances delay against transmitter power on each wireless link. The DPC scheme is scalable, as each link autonomously updates its power based on the i ...
We propose a distributed least-mean squares (LMS) procedure based on a diffusion strategy for localization and tracking of mobile terminals in cellular networks. In the proposed algorithm, collaborating base stations measure two sets of parameters, namely, ...