Sciweavers

5234 search results - page 906 / 1047
» Simulation of Computer Network Attacks
Sort
View
110
Voted
LCN
2008
IEEE
15 years 10 months ago
Optimal distance-based clustering for tag anti-collision in RFID systems
—Tag collisions can impose a major delay in Radio Frequency IDentification (RFID) systems. Such collisions are hard to overcome with passive tags due to their limited capabiliti...
Waleed Alsalih, Kashif Ali, Hossam S. Hassanein
159
Voted
LCN
2008
IEEE
15 years 10 months ago
Supporting geographical queries onto DHTs
Location-based services (LBS) are currently receiving world-wide attention as a consequence of the massive usage of mobile devices, but such location services require scalable dis...
Jordi Pujol Ahulló, Pedro García L&o...
137
Voted
SRDS
2008
IEEE
15 years 10 months ago
Self-Stabilization in Tree-Structured Peer-to-Peer Service Discovery Systems
The efficiency of service discovery is critical in the development of fully decentralized middleware intended to manage large scale computational grids. This demand influenced t...
Eddy Caron, Ajoy Kumar Datta, Franck Petit, C&eacu...
107
Voted
TRIDENTCOM
2008
IEEE
15 years 10 months ago
A flexible dual frequency testbed for RFID
This paper presents the setup of a testbed developed for the fast evaluation of RFID systems in two frequency domains. At the one hand the 13.56 MHz and at the other hand the 868 ...
Christoph Angerer, Martin Holzer 0002, Bastian Kne...
119
Voted
WCNC
2008
IEEE
15 years 10 months ago
User Assignment for MIMO-OFDM Systems with Multiuser Linear Precoding
— Recent work has developed single-carrier linear precoding for the multiuser downlink for multiple-input multipleoutput (MIMO) systems. This paper addresses the problem of user ...
Hassen Karaa, Raviraj S. Adve