Sciweavers

10044 search results - page 1848 / 2009
» Authentication in Wireless Networks
Sort
View
HOTNETS
2010
14 years 12 months ago
Successive interference cancellation: a back-of-the-envelope perspective
Successive interference cancellation (SIC) is a physical layer capability that allows a receiver to decode packets that arrive simultaneously. While the technique is well known in...
Souvik Sen, Naveen Santhapuri, Romit Roy Choudhury...
ICASSP
2011
IEEE
14 years 8 months ago
Mixed-integer linear programming framework for max-min power control with single-stage interference cancellation
We consider a wireless network comprising a number of mutuallyinterfering links. We study the transmit power control problem that determines the egalitarian signal-to-interference...
Eleftherios Karipidis, Di Yuan, Erik G. Larsson
INFOCOM
2011
IEEE
14 years 8 months ago
Optimized asynchronous multi-channel neighbor discovery
—We consider the problem of neighbor discovery in wireless networks with nodes operating in multiple frequency bands and with asymmetric beacon intervals. This is a challenging t...
Niels Karowski, Aline Carneiro Viana, Adam Wolisz
WWW
2006
ACM
16 years 5 months ago
Invisible participants: how cultural capital relates to lurking behavior
The asymmetry of activity in virtual communities is of great interest. While participation in the activities of virtual communities is crucial for a community's survival and ...
Vladimir Soroka, Sheizaf Rafaeli
EDBT
2008
ACM
112views Database» more  EDBT 2008»
16 years 5 months ago
Providing freshness guarantees for outsourced databases
Database outsourcing becomes increasingly attractive as advances in network technologies eliminate the perceived performance difference between in-house databases and outsourced d...
Min Xie, Haixun Wang, Jian Yin, Xiaofeng Meng
« Prev « First page 1848 / 2009 Last » Next »