Sciweavers

4761 search results - page 846 / 953
» Performance of Protocols
Sort
View
IJSSOE
2010
153views more  IJSSOE 2010»
14 years 7 months ago
SLIM: Service Location and Invocation Middleware for Mobile Wireless Sensor and Actuator Networks
One of the main obstacles to the adoption of Wireless Sensor Networks (WSNs) outside the research community is the lack of high level mechanisms to easily program them. This probl...
Gianpaolo Cugola, Alessandro Margara
JSAC
2011
137views more  JSAC 2011»
14 years 4 months ago
Cognitive Network Interference
—Opportunistic spectrum access creates the opening of under-utilized portions of the licensed spectrum for reuse, provided that the transmissions of secondary radios do not cause...
Alberto Rabbachin, Tony Q. S. Quek, Hyundong Shin,...
TSE
2010
230views more  TSE 2010»
14 years 4 months ago
Vulnerability Discovery with Attack Injection
The increasing reliance put on networked computer systems demands higher levels of dependability. This is even more relevant as new threats and forms of attack are constantly being...
João Antunes, Nuno Ferreira Neves, Miguel C...
TWC
2010
14 years 4 months ago
Cellular Systems with Non-Regenerative Relaying and Cooperative Base Stations
In this paper, the performance of cellular networks with joint multicell processing and dedicated relay terminals is investigated. It is assumed that each relay terminal is capable...
Oren Somekh, Osvaldo Simeone, Harold Vincent Poor,...
ICASSP
2011
IEEE
14 years 1 months ago
ML decoding in decode-and-forward based cooperative communication system
Abstract— In this paper, we derive a maximum-likelihood (ML) decoder of the decode-and-forward (DF) protocol utilizing an arbitrary complex-valued M-point constellation. Existing...
Manav R. Bhatnagar, Are Hjørungnes