Sciweavers

10044 search results - page 1960 / 2009
» Authentication in Wireless Networks
Sort
View
255
Voted
ISJ
2010
15 years 2 months ago
User involvement in developing mobile and temporarily interconnected systems
Information systems (IS) research on user involvement has primarily theorized relationships between developers, managers and users in systems development. However, so far, marginal...
Ola Henfridsson, Rikard Lindgren
183
Voted
TIT
2011
209views more  TIT 2011»
14 years 12 months ago
Belief Propagation and LP Relaxation for Weighted Matching in General Graphs
Loopy belief propagation has been employed in a wide variety of applications with great empirical success, but it comes with few theoretical guarantees. In this paper we analyze t...
Sujay Sanghavi, Dmitry M. Malioutov, Alan S. Wills...
EJWCN
2010
156views more  EJWCN 2010»
14 years 12 months ago
On Performance Modeling of Ad Hoc Routing Protocols
Simulation studies have been the predominant method of evaluating ad hoc routing algorithms. Despite their wide use and merits, simulations are generally time consuming. Furthermo...
Muhammad Saleem, Syed Ali Khayam, Muddassar Farooq
173
Voted
TCOM
2010
162views more  TCOM 2010»
14 years 11 months ago
Power Allocation in MMSE Relaying over Frequency-Selective Rayleigh Fading Channels
Abstract--This paper develops an amplify-and-forward relaying scheme for multiuser wireless cooperative networks under frequency-selective block-fading. Single-carrier frequency di...
Tung T. Pham, Ha H. Nguyen, Hoang Duong Tuan
167
Voted
TSMC
2010
14 years 11 months ago
Bio-inspired Algorithms for Autonomous Deployment and Localization of Sensor Nodes
Abstract--Optimal deployment and accurate localization of sensor nodes have a strong influence on the performance of a wireless sensor network (WSN). This paper considers real-time...
Raghavendra V. Kulkarni, Ganesh K. Venayagamoorthy
« Prev « First page 1960 / 2009 Last » Next »