Sciweavers

4985 search results - page 892 / 997
» Re-Configurable Computing in Wireless
Sort
View
135
Voted
ADHOCNOW
2008
Springer
15 years 10 months ago
Distributed Monitoring in Ad Hoc Networks: Conformance and Security Checking
Ad hoc networks are exposed more than traditional networks to security threats due to their mobility and open architecture aspects. In addition, any dysfunction due to badly congu...
Wissam Mallouli, Bachar Wehbi, Ana R. Cavalli
117
Voted
GLOBECOM
2007
IEEE
15 years 10 months ago
Power-Modulated Challenge-Response Schemes for Verifying Location Claims
—Location information should be verifiable in order to support new computing and information services. In this paper, we adapt the classical challenge-response method for authen...
Yu Zhang, Zang Li, Wade Trappe
113
Voted
ICC
2007
IEEE
126views Communications» more  ICC 2007»
15 years 10 months ago
Evaluation of Grouping Strategies for an Hierarchical SDMA/TDMA Scheduling Process
Abstract— Adding SDMA capabilities to modern wireless communication systems like IEEE 802.16 WiMAX promises high system capacity gains but raises the problem of combining orthogo...
Christian Hoymann, Jan Ellenbeck, Ralf Pabst, Marc...
113
Voted
ICC
2007
IEEE
101views Communications» more  ICC 2007»
15 years 10 months ago
Range-based Mobility Estimations in MANETs with Application to Link Availability Prediction
— The quality of communications in mobile ad-hoc networks is largely determined by the topological stability. Characterizing the mobility of mobile nodes (e.g. how often they mov...
Zhuoqun Li, Lingfen Sun, Emmanuel C. Ifeachor
117
Voted
ICC
2007
IEEE
153views Communications» more  ICC 2007»
15 years 10 months ago
An End-to-End Technique to Estimate the Transmission Rate of an IEEE 802.11 WLAN
— The deployment of wireless LANs (WLANs) has been steadily increasing over the years and estimating the actual bit rate of a WLAN device is important for management and applicat...
Antonio Augusto de Aragão Rocha, Rosa Maria...