Sciweavers

12032 search results - page 2156 / 2407
» Simulation of Manufacturing Systems
Sort
View
JHSN
2006
95views more  JHSN 2006»
15 years 4 months ago
IPsec/VPN security policy correctness and assurance
: With IPSec/VPN policies being widely deployed, how to correctly specify and configure them is critical in enforcing security requirements. Under current practice, IPSec/VPN polic...
Yanyan Yang, Charles U. Martel, Zhi (Judy) Fu, Shy...
ENGL
2007
112views more  ENGL 2007»
15 years 4 months ago
Cooperative Transmission Scheme to Increase Gain by Using STBC
— Multiple-Input Multiple-Output (MIMO) systems are composed of source and destination nodes with multiple antennas. But, when nodes cannot support multiple antennas due to size ...
Ho-Jung An, Jee-Hoon Kim, Hyoung-Kyu Song
MIS
2008
Springer
130views Multimedia» more  MIS 2008»
15 years 4 months ago
Adaptive and fuzzy approaches for nodes affinity management in wireless ad-hoc networks
In most of the ad-hoc routing protocols, a static link lifetime (LL) is used for a newly discovered neighbors. Though this works well for networks with fixed infrastructures, it is...
Essam Natsheh, Tat Chee Wan
JSAC
2006
104views more  JSAC 2006»
15 years 4 months ago
Queue Proportional Scheduling via Geometric Programming in Fading Broadcast Channels
For fading broadcast channels (BC), a throughput optimal scheduling policy called queue proportional scheduling (QPS) is presented via geometric programming (GP). QPS finds a data ...
Kibeom Seong, Ravi Narasimhan, John M. Cioffi
JSAC
2006
153views more  JSAC 2006»
15 years 4 months ago
Dynamic spectrum access in open spectrum wireless networks
One of the reasons for the limitation of bandwidth in current generation wireless networks is the spectrum policy of the Federal Communications Commission (FCC). But, with the spec...
Yiping Xing, Rajarathnam Chandramouli, Stefan Mang...
« Prev « First page 2156 / 2407 Last » Next »