125,964 research outputs found

    Network emulation focusing on QoS-Oriented satellite communication

    Get PDF
    This chapter proposes network emulation basics and a complete case study of QoS-oriented Satellite Communication

    Cross-Sender Bit-Mixing Coding

    Full text link
    Scheduling to avoid packet collisions is a long-standing challenge in networking, and has become even trickier in wireless networks with multiple senders and multiple receivers. In fact, researchers have proved that even {\em perfect} scheduling can only achieve R=O(1lnN)\mathbf{R} = O(\frac{1}{\ln N}). Here NN is the number of nodes in the network, and R\mathbf{R} is the {\em medium utilization rate}. Ideally, one would hope to achieve R=Θ(1)\mathbf{R} = \Theta(1), while avoiding all the complexities in scheduling. To this end, this paper proposes {\em cross-sender bit-mixing coding} ({\em BMC}), which does not rely on scheduling. Instead, users transmit simultaneously on suitably-chosen slots, and the amount of overlap in different user's slots is controlled via coding. We prove that in all possible network topologies, using BMC enables us to achieve R=Θ(1)\mathbf{R}=\Theta(1). We also prove that the space and time complexities of BMC encoding/decoding are all low-order polynomials.Comment: Published in the International Conference on Information Processing in Sensor Networks (IPSN), 201

    The effectiveness of mHealth interventions for maternal, newborn and child health in low- and middle-income countries:Protocol for a systematic review and meta-analysis

    Get PDF
    Rates of maternal, newborn and child (MNCH) mortality and morbidity are vastly greater in low– than in high–income countries and represent a major source of global health inequity. A host of systemic, economic, geopolitical and sociocultural factors have been implicated. Mobile information and communication technologies hold potential to ameliorate several of these challenges by supporting coordinated and evidence–based care, facilitating community based health services and enabling citizens to access health information and support. mHealth has attracted considerable attention as a means of supporting maternal, newborn and child health in developing countries and research to assess the impacts of mHealth interventions is increasing. While a number of expert reviews have attempted to summarise this literature, there remains a need for a fully systematic review employing gold standard methods of evidence capture, critical appraisal and meta–analysis, in order to comprehensively map, quality assess and synthesise this body of knowledge

    Quantum authentication with key recycling

    Get PDF
    We show that a family of quantum authentication protocols introduced in [Barnum et al., FOCS 2002] can be used to construct a secure quantum channel and additionally recycle all of the secret key if the message is successfully authenticated, and recycle part of the key if tampering is detected. We give a full security proof that constructs the secure channel given only insecure noisy channels and a shared secret key. We also prove that the number of recycled key bits is optimal for this family of protocols, i.e., there exists an adversarial strategy to obtain all non-recycled bits. Previous works recycled less key and only gave partial security proofs, since they did not consider all possible distinguishers (environments) that may be used to distinguish the real setting from the ideal secure quantum channel and secret key resource.Comment: 38+17 pages, 13 figures. v2: constructed ideal secure channel and secret key resource have been slightly redefined; also added a proof in the appendix for quantum authentication without key recycling that has better parameters and only requires weak purity testing code
    corecore