Sciweavers

4985 search results - page 886 / 997
» Re-Configurable Computing in Wireless
Sort
View
95
Voted
WCNC
2008
IEEE
15 years 10 months ago
Genetic Algorithm Aided Design of Near-Capacity Irregular Variable Length Codes
— In this paper we demonstrate that our ability to match the EXtrinsic Information Transfer (EXIT) function of an Irregular Variable Length Code (IrVLC) to that of a seriallyconc...
Robert G. Maunder, Lajos Hanzo
118
Voted
WCNC
2008
IEEE
15 years 10 months ago
Connectivity-Aware Network Maintenance via Relays Deployment
— In this paper, we address the network maintenance problem, in which we aim to maximize the lifetime of a sensor network by adding a set of relays to it. The network lifetime is...
Ahmed S. Ibrahim, Karim G. Seddik, K. J. Ray Liu
WCNC
2008
IEEE
15 years 10 months ago
Hop-by-Hop Routing Strategy for Multihop Decode-and-Forward Cooperative Networks
Abstract— In this paper, focusing on multihop decode-andforward cooperative networks, a hop-by-hop routing strategy is designed to optimize the end-to-end outage performance when...
Lu Zhang 0005, Leonard J. Cimini Jr.
141
Voted
WCNC
2008
IEEE
15 years 10 months ago
Decoding on Graphs: LDPC-Coded MISO Systems and Belief Propagation
— This paper proposes a new approach for decoding LDPC codes over MISO channels. Since in an nT × 1 MISO system with a modulation of alphabet size 2M, nT transmitted symbols are...
Amir H. Djahanshahi, Paul H. Siegel, Laurence B. M...
WCNC
2008
IEEE
15 years 10 months ago
A Secure Routing Protocol in Proactive Security Approach for Mobile Ad-Hoc Networks
—Secure routing of Mobile Ad-hoc Networks (MANETs) is still a hard problem after years of research. We therefore propose to design a secure routing protocol in a new approach. Th...
Shushan Zhao, Akshai K. Aggarwal, Shuping Liu, Hua...