Sciweavers

4761 search results - page 698 / 953
» Performance of Protocols
Sort
View
GLOBECOM
2009
IEEE
15 years 11 months ago
Randomized Multi-Channel Interrogation Algorithm for Large-Scale RFID Systems
— A radio frequency identification (RFID) system consists of a set of readers and several objects, equipped with small computer chips, called tags. In a dense RFID system, where...
Amir Hamed Mohsenian Rad, Vahid Shah-Mansouri, Vin...
120
Voted
GLOBECOM
2009
IEEE
15 years 11 months ago
The Resource-Optimized Differentially Modulated Hybrid AF/DF Cooperative Cellular Uplink
—In multi-user cellular uplinks cooperating mobiles may share their antennas in order to achieve transmit diversity by formig a virtual antenna array (VAA) in a distributed fashi...
Li Wang, Lajos Hanzo
WETICE
2009
IEEE
15 years 11 months ago
BitTorrent or BitCrunch: Evidence of a Credit Squeeze in BitTorrent?
Abstract—BitTorrent is a highly popular peer-to-peer filesharing protocol. Much BitTorrent activity takes place within private virtual communities called “Private Trackers” ...
David Hales, Rameez Rahman, Boxun Zhang, Michel Me...
WIMOB
2009
IEEE
15 years 11 months ago
Interference across Multi-hop Wireless Chains
—Chains or multi-hop paths are the fundamental communication structure in Multi-Hop Wireless Networks. Understanding chain behavior is critical in order to build effective higher...
Vinay Kolar, Saquib Razak, Nael B. Abu-Ghazaleh, P...
INFOCOM
2009
IEEE
15 years 11 months ago
Approximation Algorithms for Data Broadcast in Wireless Networks
—Broadcasting is a fundamental operation in wireless networks and plays an important role in the communication protocol design. In multihop wireless networks, however, interferen...
Rajiv Gandhi, Yoo-Ah Kim, Seungjoon Lee, Jiho Ryu,...