Sciweavers

291 search results - page 42 / 59
» Localizing Multiple Jamming Attackers in Wireless Networks
Sort
View
WCNC
2008
IEEE
15 years 8 months ago
Performance Comparison of Uplink WLANs with Single-User and Multi-User MIMO Schemes
— In this paper, we compare the performance of wireless local area networks (WLANs) with single-user MIMO (SU-MIMO) and multi-user MIMO (MU-MIMO) in terms of collision probabilit...
Hu Jin, Bang Chul Jung, Ho Young Hwang, Dan Keun S...
ESAS
2007
Springer
15 years 5 months ago
The Candidate Key Protocol for Generating Secret Shared Keys from Similar Sensor Data Streams
Secure communication over wireless channels necessitates authentication of communication partners to prevent man-in-the-middle attacks. For spontaneous interaction between independ...
Rene Mayrhofer
PERCOM
2003
ACM
16 years 1 months ago
System Design of Smart Table
This paper describes the system design of Smart Table, a table that can track and identify multiple objects simultaneously when placed on top of its surface. The table has been de...
Philipp Steurer, Mani B. Srivastava
MASCOTS
2004
15 years 3 months ago
MC-CDMA Based IEEE 802.11 Wireless LAN
In this paper, a modified version of the IEEE 802.11a protocol is proposed and evaluated. We combine MultiCarrier Code Division Multiple Access (MC-CDMA), a novel, high capacity m...
Georgios Orfanos, Jörg Habetha, Ling Liu
NETWORK
2006
218views more  NETWORK 2006»
15 years 1 months ago
Quality of service for packet telephony over mobile ad hoc networks
IP telephony over mobile ad hoc networks is a topic of emerging interest in the research arena as one of the paths toward the fixed-mobile convergence in telecommunications networ...
Paolo Giacomazzi, Luigi Musumeci, Giuseppe Caizzon...