Sciweavers

10044 search results - page 1846 / 2009
» Authentication in Wireless Networks
Sort
View
CORR
2007
Springer
110views Education» more  CORR 2007»
15 years 5 months ago
A Training based Distributed Non-Coherent Space-Time Coding Strategy
— In this paper, differential unitary space-time coding and non-coherent space-time coding for the training based approach of Kim and Tarokh are addressed. For this approach, nec...
G. Susinder Rajan, B. Sundar Rajan
IJRFITA
2007
114views more  IJRFITA 2007»
15 years 5 months ago
Semi-passive RFID and beyond: steps towards automated quality tracing in the food chain
: Precise temperature monitoring is the major precondition to supervise quality losses within the transport chain for fresh products. Different types of miniaturised data loggers w...
Reiner Jedermann, Walter Lang
126
Voted
TCOM
2008
97views more  TCOM 2008»
15 years 5 months ago
Error-resilient packet header compression
Network traffic statistics show that, because shorter packets predominate in many applications, headers impose a considerable overhead. But the header content is largely repetitiv...
Vijay Suryavanshi, Aria Nosratinia
143
Voted
TIT
2008
100views more  TIT 2008»
15 years 5 months ago
Communication Via Decentralized Processing
Abstract-- The common problem of a nomadic terminal sending information to a remote destination via agents with lossless connections is investigated. Such a setting suits, e.g. acc...
Amichai Sanderovich, Shlomo Shamai, Yossef Steinbe...
156
Voted
JSA
2000
96views more  JSA 2000»
15 years 4 months ago
Design techniques for low-power systems
Portable products are being used increasingly. Because these systems are battery powered, reducing power consumption is vital. In this report we give the properties of low power d...
Paul J. M. Havinga, Gerard J. M. Smit
« Prev « First page 1846 / 2009 Last » Next »