Back to Results
First PageMeta Content
Information theory / Theoretical computer science / Routing / Computing / Telecommunications engineering / Network coding / MORE protocol / Randomized algorithm / Packet forwarding / Wireless networking / Coding theory / Finite fields


Identifying Pollution Attackers in Network-Coding Enabled Wireless Mesh Networks Yongkun Li John C.S. Lui
Add to Reading List

Document Date: 2011-05-06 01:09:23


Open Document

File Size: 113,68 KB

Share Result on Facebook

City

Monticello / Oakland / New York / /

Company

Multicast Networks / IEEE Press / P2P Live Streaming Systems / IEEE Radio / Wireless Mesh Networks / /

Country

United States / /

/

Facility

Monticello / Engineering The Chinese University of Hong Kong Email / /

IndustryTerm

brief background on network / wireless resource / wireless channels / backbone network / Wireless Opportunistic Routing / Wireless Environments / Wireless Network / wireless systems / opportunistic routing protocol / distributed algorithms / Wireless network security / easy Internet access / background on network / detection algorithm / mesh routers / detection algorithms / computer communications / wireless networks / mesh networks / /

Organization

Chinese University of Hong Kong Email / Department of Computer Science / Network-Coding Enabled Wireless Mesh Networks Yongkun Li John C.S. Lui Department of Computer Science / /

Position

Prime Minister / transmission scheduler / /

Product

Sony Ericsson P1i Smartphone / /

ProvinceOrState

California / New York / /

PublishedMedium

IEEE Transactions on Information Theory / /

Technology

Randomized Detection Algorithm / randomized Algorithm / opportunistic routing protocol / existing routing protocol / Secure Network Protocols / Using detection Algorithm / Mobile Computing / detection algorithms / Simulation / detection algorithm / mesh routers / /

SocialTag