Sciweavers

2268 search results - page 9 / 454
» Modeling wireless shadow networks
Sort
View
PIMRC
2010
IEEE
14 years 9 months ago
Energy-delay tradeoff analysis in embedded M2M networks with channel coding
Abstract--Machine-to-Machine (M2M), an emerging communications paradigm, is a facilitator of data flows between machines used, e.g., in mission-critical applications. Focusing in t...
Tatjana Predojev, Jesus Alonso-Zarate, Mischa Dohl...
JSAC
2011
107views more  JSAC 2011»
14 years 6 months ago
Joint Network Capacity Region for Cognitive Networks Heterogeneous Environments and RF-Environment Awareness
In this paper, we characterize the joint network capacity region for a licensed broadcast (primary) and ad hoc cognitive (secondary) network in a heterogeneous environment, includ...
Yuchul Kim, Gustavo de Veciana
CISSE
2008
Springer
15 years 1 months ago
Modeling Trust in Wireless Ad-Hoc Networks
Tirthankar Ghosh, Hui Xu
PERCOM
2008
ACM
15 years 11 months ago
Protecting Users' Anonymity in Pervasive Computing Environments
The large scale adoption of adaptive services in pervasive and mobile computing is likely to be conditioned to the availability of reliable privacy-preserving technologies. Unfort...
Linda Pareschi, Daniele Riboni, Claudio Bettini