Sciweavers

10044 search results - page 1960 / 2009
» Authentication in Wireless Networks
Sort
View
ISJ
2010
14 years 8 months ago
User involvement in developing mobile and temporarily interconnected systems
Information systems (IS) research on user involvement has primarily theorized relationships between developers, managers and users in systems development. However, so far, marginal...
Ola Henfridsson, Rikard Lindgren
TIT
2011
209views more  TIT 2011»
14 years 6 months ago
Belief Propagation and LP Relaxation for Weighted Matching in General Graphs
Loopy belief propagation has been employed in a wide variety of applications with great empirical success, but it comes with few theoretical guarantees. In this paper we analyze t...
Sujay Sanghavi, Dmitry M. Malioutov, Alan S. Wills...
116
Voted
EJWCN
2010
156views more  EJWCN 2010»
14 years 6 months ago
On Performance Modeling of Ad Hoc Routing Protocols
Simulation studies have been the predominant method of evaluating ad hoc routing algorithms. Despite their wide use and merits, simulations are generally time consuming. Furthermo...
Muhammad Saleem, Syed Ali Khayam, Muddassar Farooq
TCOM
2010
162views more  TCOM 2010»
14 years 5 months ago
Power Allocation in MMSE Relaying over Frequency-Selective Rayleigh Fading Channels
Abstract--This paper develops an amplify-and-forward relaying scheme for multiuser wireless cooperative networks under frequency-selective block-fading. Single-carrier frequency di...
Tung T. Pham, Ha H. Nguyen, Hoang Duong Tuan
TSMC
2010
14 years 5 months ago
Bio-inspired Algorithms for Autonomous Deployment and Localization of Sensor Nodes
Abstract--Optimal deployment and accurate localization of sensor nodes have a strong influence on the performance of a wireless sensor network (WSN). This paper considers real-time...
Raghavendra V. Kulkarni, Ganesh K. Venayagamoorthy
« Prev « First page 1960 / 2009 Last » Next »