Sciweavers

2268 search results - page 363 / 454
» Modeling wireless shadow networks
Sort
View
APCHI
2008
IEEE
15 years 11 months ago
Denial of Sleeping: Performance Analysis and Counteracting Strategy
Denial of Sleeping is a novel type of potential attacks in wireless network. The object of the attack is a sensor node’s power supply. To make sensors inexpensive so that they ca...
Vladimir V. Shakhov, Hyunseung Choo
ICC
2007
IEEE
129views Communications» more  ICC 2007»
15 years 11 months ago
Closed-Form Expressions for the Outage and Error Probabilities of Decode-and-Forward Relaying in Dissimilar Rayleigh Fading Chan
—User cooperation protocols, where mobile stations relay signals to the final destination, have been proposed for wireless networks. A general mathematical probability model is ...
Jeremiah Hu, Norman C. Beaulieu
FPL
2000
Springer
95views Hardware» more  FPL 2000»
15 years 8 months ago
It's FPL, Jim - But Not as We Know It! Opportunities for the New Commercial Architectures
Following the simple Programmable Logic Device (SPLD) and Field Programmable Gate Array (FPGA) generations a third generation of programmable logic technologies is now reaching the...
Tom Kean
INFOCOM
2010
IEEE
15 years 3 months ago
Cognitive Mobile Virtual Network Operator: Investment and Pricing with Supply Uncertainty
Abstract—This paper presents the first analytical study of optimal investment and pricing decisions of a cognitive mobile virtual network operator (C-MVNO) under spectrum supply...
Lingjie Duan, Jianwei Huang, Biying Shou
COORDINATION
2009
Springer
16 years 5 months ago
Enhanced Coordination in Sensor Networks through Flexible Service Provisioning
: Heterogeneous wireless sensor networks represent a challenging programming environment. Servilla addresses this by offering a new middleware framework that provides service provi...
Chien-Liang Fok, Gruia-Catalin Roman, Chenyang Lu