Sciweavers

10044 search results - page 1847 / 2009
» Authentication in Wireless Networks
Sort
View
WICOMM
2002
85views more  WICOMM 2002»
15 years 4 months ago
Throughput and energy performance of TCP on a wideband CDMA air interface
In this paper, we present a study on the performance of TCP, in terms of both throughput and energy consumption, in the presence of a Wideband CDMA radio interface typical of thir...
Michele Zorzi, Michele Rossi, Gianluca Mazzini
191
Voted
ERSA
2009
147views Hardware» more  ERSA 2009»
15 years 2 months ago
Fault Avoidance in Medium-Grain Reconfigurable Hardware Architectures
Medium-grain reconfigurable hardware (MGRH) architectures represent a hybrid between the versatility of a field programmable gate array (FPGA) and the computational power of a cust...
Kylan Robinson, José G. Delgado-Frias
GLOBECOM
2009
IEEE
15 years 2 months ago
Minimum-Length Scheduling for Multicast Traffic under Channel Uncertainty
Abstract--We consider a set of multicast sources, each multicasting a finite amount of data to its corresponding destinations. The objective is to minimize the time to deliver all ...
Anna Pantelidou, Anthony Ephremides
ICASSP
2009
IEEE
15 years 2 months ago
Fast mean square convergence of consensus algorithms in WSNs with random topologies
The average consensus in wireless sensor networks is achieved under assumptions of symmetric or balanced topology at every time instant. However, communication and/or node failure...
Silvana Silva Pereira, Alba Pagès-Zamora

Publication
209views
15 years 2 months ago
Adaptive beamforming method based on constrained LMS algorithm for tracking mobile user
In this paper, Constrained Least Mean Square (CLMS) algorithm for narrowband adaptive beamforming for tracking mobile user in a 2D urban environment has been used. This algorithm i...
Peyman Rahmati
« Prev « First page 1847 / 2009 Last » Next »