Sciweavers

4985 search results - page 927 / 997
» Re-Configurable Computing in Wireless
Sort
View
CN
2007
148views more  CN 2007»
14 years 9 months ago
Using taxonomies for content-based routing with ants
Although the ant metaphor has been successfully applied to routing of data packets both in wireless and fixed networks, little is known yet about its appropriateness for search i...
Elke Michlmayr, Arno Pany, Gerti Kappel
IJAHUC
2006
128views more  IJAHUC 2006»
14 years 9 months ago
Avoid 'void' in geographic routing for data aggregation in sensor networks
: Wireless sensor networks have attracted great attention in research and industrial development due to its fast-growing application potentials. New techniques must be developed fo...
Shigang Chen, Guangbin Fan, Jun-Hong Cui
IJNSEC
2006
143views more  IJNSEC 2006»
14 years 9 months ago
Password Authentication Schemes: Current Status and Key Issues
Password authentication is one of the simplest and the most convenient authentication mechanisms to deal with secret data over insecure networks. It is more frequently required in...
Chwei-Shyong Tsai, Cheng-Chi Lee, Min-Shiang Hwang
IJNSEC
2006
78views more  IJNSEC 2006»
14 years 9 months ago
Authentication and Key Agreement Protocols Preserving Anonymity
Anonymity is a very important security feature in addition to authentication and key agreement features in communication protocols. In this paper, we propose two authentication an...
Kumar V. Mangipudi, Rajendra S. Katti, Huirong Fu
JCM
2008
104views more  JCM 2008»
14 years 9 months ago
An OFDM Symbol Design for Reduced Complexity MMSE Channel Estimation
In this paper we revisit the minimum mean square error (MMSE) pilot-aided channel estimation for broadband orthogonal frequency division multiplexing (OFDM) systems. The careful de...
Carlos Ribeiro, Atílio Gameiro