Sciweavers

10044 search results - page 1958 / 2009
» Authentication in Wireless Networks
Sort
View
JCO
2010
182views more  JCO 2010»
15 years 2 months ago
Polynomial time approximation schemes for minimum disk cover problems
The following planar minimum disk cover problem is considered in this paper: given a set D of n disks and a set P of m points in the Euclidean plane, where each disk covers a subse...
Chen Liao, Shiyan Hu
JSAC
2010
131views more  JSAC 2010»
15 years 2 months ago
Joint synchronization and localization using TOAs: A linearization based WLS solution
—Joint synchronization and localization using time of arrival (TOA) measurements is a very important research topic for many wireless ad hoc sensor network applications. For such...
Shouhong Zhu, Zhiguo Ding
JUCS
2010
139views more  JUCS 2010»
15 years 2 months ago
Gabor Filter Aided 3D Ultra-Sonography Diagnosis System with WLAN Transmission Consideration
: The Gabor filter aided diagnosis system for 3-dimensional ultra-sonography (3DUS) under the WLAN environment is introduced. Due to the important relationship between breast tumou...
Wei-Ming Chen, Chi-Hsiang Lo, Han-Chieh Chao, Chun...
MONET
2010
187views more  MONET 2010»
15 years 2 months ago
A Proxy Mobile IPv6 Based Global Mobility Management Architecture and Protocol
This paper specifies a global mobility management architecture and protocol procedure called GPMIP, which is based on Proxy Mobile IPv6. In GPMIP, mobility management is performed ...
Huachun Zhou, Hongke Zhang, Yajuan Qin, Hwang-Chen...
TCOM
2010
131views more  TCOM 2010»
15 years 2 months ago
Distance-based node activation for geographic transmissions in fading channels
In wireless multi-hop packet radio networks (MPRNs) that employ geographic transmissions, sleep schedules or node activation techniques may be used to power off some nodes to cons...
Tathagata D. Goswami, John M. Shea, Murali Rao, Jo...
« Prev « First page 1958 / 2009 Last » Next »