Sciweavers

411 search results - page 1 / 83
» Design of a Transmission Protocol for a CVE
Sort
View
ICIP
2006
IEEE
14 years 7 months ago
Design of a Transmission Protocol for a CVE
Virtual reality is a useful tool to train individuals for various different situations or scenarios. A single person utilizing a virtual environment can greatly enhance their skil...
Fred Stakem, Ghassan Alregib, Biing-Hwang Juang, M...
WINET
2008
94views more  WINET 2008»
13 years 5 months ago
Transmission costs, selfish nodes, and protocol design
We study how selfish nodes react to transmission costs in wireless networks. Intuitively, it seems that transmission costs should have a stabilizing effect as (rational) nodes will...
Peter Marbach
TSP
2011
210views more  TSP 2011»
13 years 22 days ago
Physical Layer Network Coding and Precoding for the Two-Way Relay Channel in Cellular Systems
In this paper, we study the application of physical layer network coding to the joint design of uplink and downlink transmissions, where the base station and the relay have multip...
Zhiguo Ding, Ioannis Krikidis, John S. Thompson, K...
EJWCN
2010
162views more  EJWCN 2010»
13 years 20 days ago
OMNeT++-Based Cross-Layer Simulator for Content Transmission over Wireless Ad Hoc Networks
Flexbility and deployment simplicity are among the numerous advantages of wireless links when compared to standard wired communications. However, challenges do remain high for wire...
Raphaël Massin, Catherine Lamy-Bergot, Christ...
IJACT
2010
90views more  IJACT 2010»
13 years 19 days ago
Unconditionally reliable and secure message transmission in undirected synchronous networks: possibility, feasibility and optima
: We study the interplay of network connectivity and the issues related to the `possibility', `feasibility' and `optimality' for unconditionally reliable message tra...
Arpita Patra, Ashish Choudhury, C. Pandu Rangan, K...