Authenticating mobile computing users can require a significant amount of processing and communications resources— particularly when protocols based on public key encryption are...
WLANs have become an important last-mile technology for providing internet access within homes and enterprises. In such indoor deployments, the wireless channel suffers from signi...
—With the availability of multiple rates in IEEE 802.11a/b/g wireless LANs, it is desirable to improve the network capacity and temporal fairness by sending multiple consecutive ...
Ming Li, Yang Xiao, Hua Zhu, Imrich Chlamtac, Bala...
Abstract--In this paper, we propose a novel spectrum occupancy model designed to generate accurate temporal and frequency behavior of various wireless transmissions. Our proposed w...
Chittabrata Ghosh, Srikanth Pagadarai, Dharma P. A...
In this paper, cooperative transmission protocols are proposed for wireless broadcast channels, a fundamental building block of wireless communication networks. The concepts of co...
Zhiguo Ding, Kin K. Leung, Dennis Goeckel, Donald ...