Sciweavers

869 search results - page 19 / 174
» Improved access point selection
Sort
View
WISEC
2010
ACM
15 years 4 months ago
On the reliability of wireless fingerprinting using clock skews
Determining whether a client station should trust an access point is a known problem in wireless security. Traditional approaches to solving this problem resort to cryptography. B...
Chrisil Arackaparambil, Sergey Bratus, Anna Shubin...
ICC
2007
IEEE
115views Communications» more  ICC 2007»
15 years 3 months ago
Cooperation and Routing in Multi-Hop Networks
— We study the cross-layer problem of combining routing and cooperative diversity in multi-hop, bandwidthconstrained networks with dedicated multiple access. Previous work in coo...
Elzbieta Beres, Raviraj Adve
GLOBECOM
2006
IEEE
15 years 3 months ago
A Distributed Opportunistic Access Scheme for OFDMA Systems
Abstract— In this paper, we propose a distributed opportunistic access scheme for uplink OFDMA systems. The sub-carriers are grouped into several sub-channels. Users access these...
Dandan Wang, Hlaing Minn, Naofal Al-Dhahir
164
Voted
BIS
2011
289views Business» more  BIS 2011»
13 years 9 months ago
Advanced Resource Selection for Federated Enterprise Search
Distributed information retrieval is a well-known approach for accessing heterogeneous, highly autonomous sources of unstructured information. Selecting and querying only a number ...
Matthias Wauer, Daniel Schuster, Alexander Schill
167
Voted
ISMIS
2011
Springer
14 years 10 days ago
Data Access Paths in Processing of Sets of Frequent Itemset Queries
Abstract. Frequent itemset mining can be regarded as advanced database querying where a user specifies the dataset to be mined and constraints to be satisfied by the discovered i...
Piotr Jedrzejczak, Marek Wojciechowski