Sciweavers

123 search results - page 24 / 25
» Performance Analysis of V-BLAST with Optimum Power Allocatio...
Sort
View
WOWMOM
2009
ACM
191views Multimedia» more  WOWMOM 2009»
13 years 11 months ago
Multi-channel spectrum-agile MAC protocol with adaptive load control
Abstract— Spectrum-agile radios, also known as cognitive radios, have a great potential to improve spectrum utilization by enabling dynamic access to the spectrum. A key challeng...
Fan Wang, Marwan Krunz
GLOBECOM
2007
IEEE
13 years 11 months ago
A Novel Distributed Scheduling Algorithm for Wireless Mesh Networks
— Wireless multi-hop, mesh networks are being considered as a candidate to backhaul data traffic from access networks to the wired Internet. These mesh networks are referred to a...
Yun Hou, Kin K. Leung
CONCUR
2008
Springer
13 years 7 months ago
Modeling Computational Security in Long-Lived Systems
Abstract. For many cryptographic protocols, security relies on the assumption that adversarial entities have limited computational power. This type of security degrades progressive...
Ran Canetti, Ling Cheung, Dilsun Kirli Kaynar, Nan...
TCOM
2010
99views more  TCOM 2010»
13 years 3 months ago
Code design for MIMO downlink with imperfect CSIT
—In this letter, we implement a simplified version of the Cover - van der Meulen - Hajek - Pursley (CMHP) coding originally characterized by Wajcer, Wiesel, and Shamai. The vect...
Hyung-Tae Kim, Sung Hoon Lim, Inkyu Lee, Saejoon K...
MICRO
2008
IEEE
118views Hardware» more  MICRO 2008»
13 years 11 months ago
Notary: Hardware techniques to enhance signatures
Hardware signatures have been recently proposed as an efficient mechanism to detect conflicts amongst concurrently running transactions in transactional memory systems (e.g., Bulk...
Luke Yen, Stark C. Draper, Mark D. Hill