Sciweavers

10044 search results - page 1987 / 2009
» Authentication in Wireless Networks
Sort
View
CACM
2005
126views more  CACM 2005»
14 years 9 months ago
Extrovert gadgets
This paper presents a set of architectures for the composition of ubiquitous computing applications. It describes research that is being carried out in "extrovert-Gadgets&quo...
Achilles Kameas, Irene Mavrommati
TON
2008
103views more  TON 2008»
14 years 9 months ago
Fixed point analysis of single cell IEEE 802.11e WLANs: uniqueness and multistability
We consider the vector fixed point equations arising out of the analysis of the saturation throughput of a single cell IEEE 802.11e (EDCA) wireless local area network with nodes th...
Venkatesh Ramaiyan, Anurag Kumar, Eitan Altman
82
Voted
JNCA
2007
106views more  JNCA 2007»
14 years 9 months ago
Relay reduction and disjoint routes construction for scatternet over Bluetooth radio system
Bluetooth is a new technology for low-cost, low-power, and short-range wireless communication. By constructing a piconet, Bluetooth device establishes link and communicates with o...
Gwo-Jong Yu, Chih-Yung Chang, Kuei-Ping Shih, Shih...
TWC
2008
151views more  TWC 2008»
14 years 9 months ago
Energy-Efficient Cooperative Relaying over Fading Channels with Simple Relay Selection
We consider a cooperative wireless network where the source broadcasts data to relays, some or all of which cooperatively beamform to forward the data to the destination. The netw...
Ritesh Madan, Neelesh B. Mehta, Andreas F. Molisch...
INFOCOM
2010
IEEE
14 years 8 months ago
Maximizing the Contact Opportunity for Vehicular Internet Access
Abstract—With increasing popularity of media enabled handhelds, the need for high data-rate services for mobile users is evident. Large-scale Wireless LANs (WLANs) can provide su...
Zizhan Zheng, Zhixue Lu, Prasun Sinha, Santosh Kum...
« Prev « First page 1987 / 2009 Last » Next »