Sciweavers

177 search results - page 24 / 36
» jsac 2006
Sort
View
JSAC
2006
78views more  JSAC 2006»
13 years 5 months ago
On the optimality of multiantenna broadcast scheduling using zero-forcing beamforming
Abstract--Although the capacity of multiple-input/multipleoutput (MIMO) broadcast channels (BCs) can be achieved by dirty paper coding (DPC), it is difficult to implement in practi...
Taesang Yoo, Andrea J. Goldsmith
JSAC
2006
128views more  JSAC 2006»
13 years 5 months ago
A framework for misuse detection in ad hoc networks- part II
We focus on detecting intrusions in ad hoc networks using the misuse detection technique. We allow for detection modules that periodically stop functioning due to operational failu...
D. Subhadrabandhu, S. Sarkar, F. Anjum
JSAC
2006
127views more  JSAC 2006»
13 years 5 months ago
Location-based compromise-tolerant security mechanisms for wireless sensor networks
Abstract-- Node compromise is a serious threat to wireless sensor networks deployed in unattended and hostile environments. To mitigate the impact of compromised nodes, we propose ...
Yanchao Zhang, Wei Liu, Wenjing Lou, Yuguang Fang
JSAC
2006
114views more  JSAC 2006»
13 years 5 months ago
SCAN: self-organized network-layer security in mobile ad hoc networks
Protecting the network layer from malicious attacks is an important yet challenging security issue in mobile ad hoc networks. In this paper we describe SCAN, a unified networklayer...
Hao Yang, J. Shu, Xiaoqiao Meng, Songwu Lu
JSAC
2006
153views more  JSAC 2006»
13 years 5 months ago
Dynamic spectrum access in open spectrum wireless networks
One of the reasons for the limitation of bandwidth in current generation wireless networks is the spectrum policy of the Federal Communications Commission (FCC). But, with the spec...
Yiping Xing, Rajarathnam Chandramouli, Stefan Mang...