Sciweavers

10044 search results - page 1841 / 2009
» Authentication in Wireless Networks
Sort
View
ICC
2000
IEEE
211views Communications» more  ICC 2000»
15 years 9 months ago
Higher Order Adaptive Filter Based Predistortion for Nonlinear Distortion Compensation of Radio over Fiber Links
 The biggest limitation of Radio over Fiber (ROF) links in a wireless network is its limited dynamic range due to ‘Non Linear Distortions’ (NLD). In this paper a higher orde...
Xavier N. Fernando, Abu B. Sesay
RSP
1998
IEEE
15 years 9 months ago
Reusable Architecture Templates and Automatic Specification Mapping for the Efficient Implementation of ATM Protocols
This paper presents an algorithm for the automatic mapping of problem specifications to existing architecture templates. The proposed methodology supports the combination of exist...
Nikos S. Voros, Evaggelinos P. Mariatos, Michael K...
IDMS
1998
Springer
141views Multimedia» more  IDMS 1998»
15 years 9 months ago
An Image Coding and Reconstruction Scheme for Mobile Computing
An asynchronous transfer mode (ATM) wireless network has bursty and high error rates. To combat the contiguous bit loss due to damaged or dropped packets, this paper presents a cod...
Edward Y. Chang
DAC
1997
ACM
15 years 9 months ago
Tools and Methodologies for Low Power Design
-- Designing for low power has become increasingly important in a wide variety of applications, including wireless telephony, mobile computing, high performance computing, and high...
Jerry Frenkil
RTAS
1996
IEEE
15 years 9 months ago
AIDA-based real-time fault-tolerant broadcast disks
The proliferation of mobile computers and wireless networks requires the design of future distributed real-time applications to recognize and deal with the signi cant asymmetry be...
Azer Bestavros
« Prev « First page 1841 / 2009 Last » Next »