Sciweavers

10044 search results - page 1951 / 2009
» Authentication in Wireless Networks
Sort
View
ICMCS
2010
IEEE
268views Multimedia» more  ICMCS 2010»
15 years 5 months ago
Scalable MDC for 3D Stereoscopic Video using motion vector encoding
Interest in 3D video visualization systems is a ever growing field. Such areas include the provision of 3D content to users thus opening the exploration of 3D video communication ...
Steven Adedoyin, Warnakulasuriya Anil Chandana Fer...
ICASSP
2010
IEEE
15 years 4 months ago
A convex relaxation for approximate maximum-likelihood 2D source localization from range measurements
This paper addresses the problem of locating a single source from noisy range measurements in wireless sensor networks. An approximate solution to the maximum likelihood location ...
Pinar Oguz-Ekim, João Pedro Gomes, Jo&atild...
GLOBECOM
2008
IEEE
15 years 4 months ago
Security Rules Specification and Analysis Based on Passive Testing
Security is a critical issue in dynamic and open distributed environments such as network-based services or wireless networks. To ensure that a certain level of security is maintai...
Wissam Mallouli, Fayçal Bessayah, Ana R. Ca...
COMCOM
2008
91views more  COMCOM 2008»
15 years 4 months ago
A WEP post-processing algorithm for a Robust 802.11 WLAN implementation
Wired Equivalent Privacy (WEP) protocol used within the IEEE 802.11 standard has "major security flaws" thus wireless local area networks (WLANs) using the protocol are ...
Taskin Koçak, Mohit Jagetia
CORR
2008
Springer
127views Education» more  CORR 2008»
15 years 4 months ago
Energy-Efficient Resource Allocation in Multiuser MIMO Systems: A Game-Theoretic Framework
This paper focuses on the cross-layer issue of resource allocation for energy efficiency in the uplink of a multiuser MIMO wireless communication system. Assuming that all of the ...
Stefano Buzzi, H. Vincent Poor, Daniela Saturnino
« Prev « First page 1951 / 2009 Last » Next »