Sciweavers

10044 search results - page 1959 / 2009
» Authentication in Wireless Networks
Sort
View
TON
2010
132views more  TON 2010»
14 years 9 months ago
The optimality of two prices: maximizing revenue in a stochastic communication system
—This paper considers the problem of pricing and transmission scheduling for an Access Point (AP) in a wireless network, where the AP provides service to a set of mobile users. T...
Longbo Huang, Michael J. Neely
ICDCS
2010
IEEE
14 years 9 months ago
Safe and Stabilizing Distributed Cellular Flows
Advances in wireless vehicular networks present us with opportunities for developing new distributed traffic control algorithms that avoid phenomena such as abrupt phase-transition...
Taylor Johnson, Sayan Mitra, Karthik Manamcheri
ICC
2009
IEEE
116views Communications» more  ICC 2009»
14 years 8 months ago
Efficient Implementation of Binary Sequence Generator for WiMAX and WRAN on Programmable Digital Signal Processor
In this paper, an efficient design for implementing binary sequence generator on 32-bit instruction execution mode TI TMS320C6416 DSP is presented. The main goal is to achieve high...
Lok Tiing Tie, Ser Wah Oh, K. J. M. Kua
ICUMT
2009
14 years 8 months ago
On the adaptivity of today's Energy-Efficient MAC protocols under varying traffic conditions
Energy efficiency is a major concern in the design of Wireless Sensor Networks (WSNs) and their communication protocols. As the radio transceiver typically accounts for a major por...
Philipp Hurni, Torsten Braun
110
Voted
AVSS
2009
IEEE
14 years 8 months ago
Multimodal Abandoned/Removed Object Detection for Low Power Video Surveillance Systems
Low-cost and low-power video surveillance systems based on networks of wireless video sensors will enter soon the marketplace with the promise of flexibility, quick deployment an...
Michele Magno, Federico Tombari, Davide Brunelli, ...
« Prev « First page 1959 / 2009 Last » Next »