125,964 research outputs found
Network emulation focusing on QoS-Oriented satellite communication
This chapter proposes network emulation basics and a complete case study of QoS-oriented Satellite Communication
Cross-Sender Bit-Mixing Coding
Scheduling to avoid packet collisions is a long-standing challenge in
networking, and has become even trickier in wireless networks with multiple
senders and multiple receivers. In fact, researchers have proved that even {\em
perfect} scheduling can only achieve . Here
is the number of nodes in the network, and is the {\em medium
utilization rate}. Ideally, one would hope to achieve ,
while avoiding all the complexities in scheduling. To this end, this paper
proposes {\em cross-sender bit-mixing coding} ({\em BMC}), which does not rely
on scheduling. Instead, users transmit simultaneously on suitably-chosen slots,
and the amount of overlap in different user's slots is controlled via coding.
We prove that in all possible network topologies, using BMC enables us to
achieve . We also prove that the space and time
complexities of BMC encoding/decoding are all low-order polynomials.Comment: Published in the International Conference on Information Processing
in Sensor Networks (IPSN), 201
The effectiveness of mHealth interventions for maternal, newborn and child health in low- and middle-income countries:Protocol for a systematic review and meta-analysis
Rates of maternal, newborn and child (MNCH) mortality and morbidity are vastly greater in low– than in high–income countries
and represent a major source of global health inequity. A host of
systemic, economic, geopolitical and sociocultural factors have been implicated. Mobile information and communication technologies hold potential to ameliorate several of these challenges by supporting coordinated and evidence–based care, facilitating community based health services and enabling citizens to access health information and support. mHealth has attracted considerable attention as a means of supporting maternal, newborn and child health in developing countries and research to assess the impacts of mHealth interventions is increasing. While a number of expert reviews have attempted to summarise this literature, there remains a need for a fully systematic review employing gold standard methods of evidence capture, critical appraisal and meta–analysis, in order to comprehensively map, quality assess and synthesise this body of knowledge
Quantum authentication with key recycling
We show that a family of quantum authentication protocols introduced in
[Barnum et al., FOCS 2002] can be used to construct a secure quantum channel
and additionally recycle all of the secret key if the message is successfully
authenticated, and recycle part of the key if tampering is detected. We give a
full security proof that constructs the secure channel given only insecure
noisy channels and a shared secret key. We also prove that the number of
recycled key bits is optimal for this family of protocols, i.e., there exists
an adversarial strategy to obtain all non-recycled bits. Previous works
recycled less key and only gave partial security proofs, since they did not
consider all possible distinguishers (environments) that may be used to
distinguish the real setting from the ideal secure quantum channel and secret
key resource.Comment: 38+17 pages, 13 figures. v2: constructed ideal secure channel and
secret key resource have been slightly redefined; also added a proof in the
appendix for quantum authentication without key recycling that has better
parameters and only requires weak purity testing code
- …