Sciweavers

10044 search results - page 1884 / 2009
» Authentication in Wireless Networks
Sort
View
155
Voted
WCNC
2008
IEEE
15 years 11 months ago
Iterative Detection of Three-Stage Concatenated FFH-MFSK
Abstract— Serially concatenated and iteratively decoded Irregular Variable Length Coding (IrVLC) combined with precoded Fast Frequency Hopping (FFH) M-ary Frequency Shift Keying ...
Sohail Ahmed, Robert G. Maunder, Lie-Liang Yang, L...
128
Voted
WCNC
2008
IEEE
15 years 11 months ago
A Low Latency Scheme for Bulk RFID Tag Reading
—Passive RFID tags transmit their ID information to a tag reader upon energization by the reader. These transmitted signals, or IDs, may collide if multiple tags transmit their I...
Erik F. Golen, Nirmala Shenoy, Xiaojun Cao
137
Voted
WCNC
2008
IEEE
15 years 11 months ago
Novel Ultra Wideband Low Complexity Ranging Using Different Channel Statistics
—UWB technology can reach centimetre level ranging and positioning accuracy in LOS propagation when time of arrival techniques are used. However, in a real positioning system, th...
Giovanni Bellusci, Gerard J. M. Janssen, Junlin Ya...
WCNC
2008
IEEE
15 years 11 months ago
An Analytical Performance Model of Opportunistic Spectrum Access in a Military Environment
— In an opportunistic spectrum sharing system, secondary users equipped with cognitive radios opportunistically access spectrum that is not being used by the primary users, i.e.,...
Shensheng Tang, Brian L. Mark
149
Voted
WCNC
2008
IEEE
15 years 11 months ago
A Closed-Form Approximation for Capacity of Multiuser MIMO Broadcast Systems: A Virtual User Approach
— Besides delivering high data rates in a point-to-point scenario, multi-input multi-output (MIMO) antenna techniques can broadcast personalized data to multiple users in the poi...
Li-Chun Wang, Chu-Jung Yeh, Chi-Fang Li
« Prev « First page 1884 / 2009 Last » Next »