Sciweavers

1383 search results - page 264 / 277
» Analysis of a Metropolitan-Area Wireless Network
Sort
View
WCNC
2008
IEEE
15 years 8 months ago
A Closed-Form Approximation for Capacity of Multiuser MIMO Broadcast Systems: A Virtual User Approach
— Besides delivering high data rates in a point-to-point scenario, multi-input multi-output (MIMO) antenna techniques can broadcast personalized data to multiple users in the poi...
Li-Chun Wang, Chu-Jung Yeh, Chi-Fang Li
QSHINE
2005
IEEE
15 years 7 months ago
Solving The Multi-Constrained Path Selection Problem By Using Depth First Search
An extended depth-first-search (EDFS) algorithm is proposed to solve the multi-constrained path (MCP) problem in quality-of-service (QoS) routing, which is NP-Complete when the n...
Zhenjiang Li, J. J. Garcia-Luna-Aceves
ENTCS
2007
178views more  ENTCS 2007»
15 years 1 months ago
Recent Advances in Real-Time Maude
This paper gives an overview of recent advances in Real-Time Maude. Real-Time Maude extends the Maude rewriting logic tool to support formal specification and analysis of object-...
Peter Csaba Ölveczky, José Meseguer
SERSCISA
2009
Springer
15 years 8 months ago
ATTENTION: ATTackEr Traceback Using MAC Layer AbNormality DetecTION
Denial-of-Service (DoS) and Distributed DoS (DDoS) attacks can cause serious problems in wireless networks due to limited network and host resources. Attacker traceback is a promi...
Yongjin Kim
CORR
2010
Springer
79views Education» more  CORR 2010»
15 years 1 months ago
A Multi-hop Multi-source Algebraic Watchdog
In our previous work (`An Algebraic Watchdog for Wireless Network Coding'), we proposed a new scheme in which nodes can detect malicious behaviors probabilistically, police th...
MinJi Kim, Muriel Médard, João Barro...