Sciweavers

10044 search results - page 1901 / 2009
» Authentication in Wireless Networks
Sort
View
CORR
2010
Springer
189views Education» more  CORR 2010»
15 years 4 months ago
Approaching Throughput-optimality in Distributed CSMA Scheduling Algorithms with Collisions
Abstract--It was shown recently that carrier sense multiple access (CSMA)-like distributed algorithms can achieve the maximal throughput in wireless networks (and task processing n...
Libin Jiang, Jean C. Walrand
AUTOMATICA
2006
84views more  AUTOMATICA 2006»
15 years 4 months ago
Optimal control of LTI systems over unreliable communication links
In this paper, optimal control of linear time-invariant (LTI) systems over unreliable communication links is studied. The motivation of the problem comes from growing applications...
Orhan C. Imer, Serdar Yüksel, Tamer Basar
JSAC
2008
108views more  JSAC 2008»
15 years 4 months ago
Collision-aware design of rate adaptation for multi-rate 802.11 WLANs
One of the key challenges in designing a rate adaptation scheme for IEEE 802.11 wireless LANs (WLANs) is to differentiate bit errors from link-layer collisions. Many recent rate a...
Jaehyuk Choi, Jongkeun Na, Yeon-sup Lim, Kihong Pa...
ENTCS
2007
158views more  ENTCS 2007»
15 years 4 months ago
Abstraction and Completeness for Real-Time Maude
ion and Completeness for Real-Time Maude Peter Csaba ¨Olveczky a,b and Jos´e Meseguer b a Department of Informatics, University of Oslo b Department of Computer Science, Universi...
Peter Csaba Ölveczky, José Meseguer
TII
2008
176views more  TII 2008»
15 years 4 months ago
Adaptive Multilevel Code Update Protocol for Real-Time Sensor Operating Systems
In wireless sensor networks each sensor node has very limited resources, and it is very difficult to find and collect them. For this reason, updating or adding programs in sensor n...
Sangho Yi, Hong Min, Yookun Cho, Jiman Hong
« Prev « First page 1901 / 2009 Last » Next »