Sciweavers

924 search results - page 125 / 185
» Heuristics for Network Coding in Wireless Networks
Sort
View
93
Voted
IWCMC
2009
ACM
15 years 4 months ago
On the capacity of BICM with QAM constellations
Abstract—In this tutorial paper we analyze the capacity of bitinterleaved coded modulation (BICM) with quadrature amplitude modulation (QAM) constellations, and we pay special at...
Alex Alvarado, Erik Agrell, Arne Svensson
CORR
2010
Springer
147views Education» more  CORR 2010»
14 years 10 months ago
Multistage Relaying Using Interference Networks
Wireless networks with multiple nodes that relay information from a source to a destination are expected to be deployed in many applications. In this work, we consider multihoppin...
Bama Muthuramalingam, Srikrishna Bhashyam, Andrew ...
PADS
2003
ACM
15 years 3 months ago
HLA-based Adaptive Distributed Simulation of Wireless Mobile Systems
Wireless networks’ models differ from wired ones at least in the innovative dynamic effects of host-mobility and open-broadcast nature of the wireless medium. Topology changes d...
Luciano Bononi, Gabriele D'Angelo, Lorenzo Donatie...
100
Voted
EGITALY
2006
14 years 11 months ago
Color Palette Images Re-indexing by Self Organizing Motor Maps
Palette re-ordering is a well known and very effective approach for improving the compression of color-indexed images. If the spatial distribution of the indexes in the image is s...
Sebastiano Battiato, Francesco Rundo, Filippo Stan...
115
Voted
TMC
2010
179views more  TMC 2010»
14 years 8 months ago
On Fast and Accurate Detection of Unauthorized Wireless Access Points Using Clock Skews
We explore the use of clock skew of a wireless local area network access point (AP) as its fingerprint to detect unauthorized APs quickly and accurately. The main goal behind usi...
Suman Jana, Sneha Kumar Kasera