Sciweavers

4985 search results - page 887 / 997
» Re-Configurable Computing in Wireless
Sort
View
WCNC
2008
IEEE
15 years 10 months ago
A Mechanism Design-Based Multi-Leader Election Scheme for Intrusion Detection in MANET
—In this paper, we study the election of multiple leaders for intrusion detection in the presence of selfish nodes in mobile ad hoc networks (MANETs). To balance the resource co...
Noman Mohammed, Hadi Otrok, Lingyu Wang, Mourad De...
WCNC
2008
IEEE
15 years 10 months ago
A Maximum-Throughput Call Admission Control Policy for CDMA Beamforming Systems
— A throughput-maximization call admission control (CAC) policy is proposed for CDMA beamforming systems in which the QoS requirements in both physical and network layers can be ...
Wei Sheng, Steven D. Blostein
135
Voted
WCNC
2008
IEEE
15 years 10 months ago
Mitigation of the Propagation of Localization Error Using Multi-Hop Bounding
Abstract—In ad hoc position-location networks, location information is obtained through the sequential estimation of node locations. An unlocalized node can estimate its location...
R. Michael Buehrer, Swaroop Venkatesh, Tao Jia
124
Voted
WCNC
2008
IEEE
15 years 10 months ago
Using Swarm Intelligence and Bayesian Inference for Aircraft Interrogation
: Sensor management deals with the efficient resource allocation to meet mission objectives of the application, air traffic control. A schedule for the sensors is constructed, whic...
Ganapathi Kamath, Xiang Ye, Lisa Ann Osadciw
WCNC
2008
IEEE
15 years 10 months ago
Iterative Detection of Three-Stage Concatenated FFH-MFSK
Abstract— Serially concatenated and iteratively decoded Irregular Variable Length Coding (IrVLC) combined with precoded Fast Frequency Hopping (FFH) M-ary Frequency Shift Keying ...
Sohail Ahmed, Robert G. Maunder, Lie-Liang Yang, L...