Wireless sensor network survey

J Yick, B Mukherjee, D Ghosal - Computer networks, 2008 - Elsevier
A wireless sensor network (WSN) has important applications such as remote environmental
monitoring and target tracking. This has been enabled by the availability, particularly in …

Nested linear/lattice codes for structured multiterminal binning

R Zamir, S Shamai, U Erez - IEEE Transactions on Information …, 2002 - ieeexplore.ieee.org
Network information theory promises high gains over simple point-to-point communication
techniques, at the cost of higher complexity. However, lack of structured coding schemes …

Rapidchain: Scaling blockchain via full sharding

M Zamani, M Movahedi, M Raykova - Proceedings of the 2018 ACM …, 2018 - dl.acm.org
A major approach to overcoming the performance and scalability limitations of current
blockchain protocols is to use sharding which is to split the overheads of processing …

Dumbo-mvba: Optimal multi-valued validated asynchronous byzantine agreement, revisited

Y Lu, Z Lu, Q Tang, G Wang - Proceedings of the 39th symposium on …, 2020 - dl.acm.org
Multi-valued validated asynchronous Byzantine agreement (MVBA), proposed in the elegant
work of Cachin et al.(CRYPTO'01), is fundamental for critical fault-tolerant services such as …

Channel polarization: A method for constructing capacity-achieving codes for symmetric binary-input memoryless channels

E Arikan - IEEE Transactions on information Theory, 2009 - ieeexplore.ieee.org
A method is proposed, called channel polarization, to construct code sequences that
achieve the symmetric capacity I(W) of any given binary-input discrete memoryless channel …

[图书][B] Handbook of finite fields

GL Mullen, D Panario - 2013 - api.taylorfrancis.com
The CRC Handbook of Finite Fields (hereafter referred to as the Handbook) is a reference
book for the theory and applications of finite fields. It is not intended to be an introductory …

[图书][B] Data networks

D Bertsekas, R Gallager - 2021 - books.google.com
This classic textbook aims to provide a fundamental understanding of the principles that
underlie the design of data networks, which form the backbone of the modern internet. It was …

Fuzzy extractors: How to generate strong keys from biometrics and other noisy data

Y Dodis, L Reyzin, A Smith - … : International Conference On The Theory And …, 2004 - Springer
We provide formal definitions and efficient secure techniques for turning biometric
information into keys usable for any cryptographic application, and reliably and securely …

[图书][B] Communication system engineering

JG Proakis, M Salehi - 2023 - 103.76.208.7
COMMUNICATION SYSTEMS ENGINEERING Page 1 COMMUNICATION SYSTEMS
ENGINEERING John G. Proakis Masoud Salehi 2nd Ed. Upper Saddle River, New Jersey 07458 …

[引用][C] Introduction to finite fields and their applications

R Lidl - 1994 - books.google.com
The theory of finite fields is a branch of modern algebra that has come to the fore in recent
years because of its diverse applications in such areas as combinatorics, coding theory …