Sciweavers

3107 search results - page 486 / 622
» Parallel Communication
Sort
View
126
Voted
ICC
2007
IEEE
155views Communications» more  ICC 2007»
15 years 9 months ago
On Supporting Robust Voice Multicasting Over Ad Hoc Wireless Networks
Abstract— In this paper, we address the problem of voice multicasting in ad hoc wireless networks. The unique characteristics of voice traffic (viz. small packet size, high pack...
G. Venkat Raju, Tamma Bheemarjuna Reddy, C. Siva R...
104
Voted
ICC
2007
IEEE
134views Communications» more  ICC 2007»
15 years 9 months ago
A MAC Protocol for Maximum Stream Allocation Depending on the Number of Antennas and Received RTS Packets in MIMO Ad Hoc Network
— MIMA-MAC is the most attractive MAC protocol for MIMO ad hoc networks, which consist of nodes with multiple antennas. MIMA-MAC, however, uses only a half of antennas for data t...
Motoki Shirasu, Iwao Sasase
ICC
2007
IEEE
122views Communications» more  ICC 2007»
15 years 9 months ago
Evaluation of Clipped-OFDM and SC/FDE Alternatives for Block Transmission Using Iterative Receiver Techniques
— A CP-assisted (Cyclic Prefix) block transmission is widely accepted as a good choice for future mobile systems, taking advantage of low-cost, flexible, FFT-based (Fast Fourie...
Paulo Torres, António Gusmão
124
Voted
VTC
2007
IEEE
15 years 9 months ago
Power Optimization of IDMA Systems with Different Target BER Constraints
— Interleave Division Multiple Access (IDMA) is a promising air interface for future wireless networks. Optimization of access schemes regarding cross user aspects is also a topi...
Petra Weitkemper, Karl-Dirk Kammeyer
113
Voted
CHES
2007
Springer
157views Cryptology» more  CHES 2007»
15 years 8 months ago
A Hardware-Assisted Realtime Attack on A5/2 Without Precomputations
Abstract. A5/2 is a synchronous stream cipher that is used for protecting GSM communication. Recently, some powerful attacks [2,10] on A5/2 have been proposed. In this contribution...
Andrey Bogdanov, Thomas Eisenbarth, Andy Rupp