Sciweavers

1275 search results - page 160 / 255
» Communication Network Analysis of the Enterprise Grid System...
Sort
View
VTC
2007
IEEE
15 years 4 months ago
Power Optimization of IDMA Systems with Different Target BER Constraints
— Interleave Division Multiple Access (IDMA) is a promising air interface for future wireless networks. Optimization of access schemes regarding cross user aspects is also a topi...
Petra Weitkemper, Karl-Dirk Kammeyer
CNSR
2007
IEEE
124views Communications» more  CNSR 2007»
15 years 4 months ago
Evaluation Framework of Location Privacy of Wireless Mobile Systems with Arbitrary Beam Pattern
Position localization of transmitters can be carried out by an adversary owning a network of pervasive receivers, which can pinpoint the victim mobile nodes’ locations with high...
Ford-Long Wong, Min Lin, Shishir Nagaraja, Ian J. ...
MOBICOM
2006
ACM
15 years 3 months ago
Fast and reliable estimation schemes in RFID systems
RFID tags are being used in many diverse applications in increasingly large numbers. These capabilities of these tags span from very dumb passive tags to smart active tags, with t...
Murali S. Kodialam, Thyaga Nandagopal
INFOCOM
2009
IEEE
15 years 4 months ago
A Social Network Based Patching Scheme for Worm Containment in Cellular Networks
Abstract—Recently, cellular phone networks have begun allowing third-party applications to run over certain open-API phone operating systems such as Windows Mobile, Iphone and Go...
Zhichao Zhu, Guohong Cao, Sencun Zhu, Supranamaya ...
INFOCOM
2005
IEEE
15 years 3 months ago
dPAM: a distributed prefetching protocol for scalable asynchronous multicast in P2P systems
— We leverage the buffering capabilities of end-systems to achieve scalable, asynchronous delivery of streams in a peer-to-peer environment. Unlike existing cache-and-relay schem...
Abhishek Sharma, Azer Bestavros, Ibrahim Matta