Sciweavers

6122 search results - page 1150 / 1225
» Securing network access in wireless sensor networks
Sort
View
VTC
2007
IEEE
15 years 4 months ago
Power Optimization of IDMA Systems with Different Target BER Constraints
— Interleave Division Multiple Access (IDMA) is a promising air interface for future wireless networks. Optimization of access schemes regarding cross user aspects is also a topi...
Petra Weitkemper, Karl-Dirk Kammeyer
CCS
2011
ACM
13 years 9 months ago
Cirripede: circumvention infrastructure using router redirection with plausible deniability
Many users face surveillance of their Internet communications and a significant fraction suffer from outright blocking of certain destinations. Anonymous communication systems a...
Amir Houmansadr, Giang T. K. Nguyen, Matthew Caesa...
WOWMOM
2005
ACM
109views Multimedia» more  WOWMOM 2005»
15 years 3 months ago
A High-Throughput MAC Strategy for Next-Generation WLANs
WLAN technology has been shown a revolutionary development during the last decade. Recently popularized IEEE 802.11a/gbased products can support up to 54 Mbps PHY (Physical layer)...
Seongkwan Kim, Youngsoo Kim, Sunghyun Choi, Kyungh...
QSHINE
2009
IEEE
15 years 4 months ago
Supporting VoIP Services in IEEE 802.11e WLANs
Voice over Internet Protocol (VoIP) over Wireless Local Area Network (WLAN) is becoming popular thanks to its cost efficiency. However, it has been a challenge to provide good qual...
Jeonggyun Yu, Munhwan Choi, Daji Qiao, Sunghyun Ch...
IWCMC
2006
ACM
15 years 3 months ago
Cross-layer performance analysis of joint rate and power adaptation schemes with multiple-user contention in Nakagami fading cha
Adaptively adjusting transmission rate and power to concurrently enhance goodput and save energy is an important issue in the wireless local area network (WLAN). However, goodput ...
Li-Chun Wang, Kuang-Nan Yen, Jane-Hwa Huang, Ander...
« Prev « First page 1150 / 1225 Last » Next »