Sciweavers

3486 search results - page 362 / 698
» System Design and Networking Protocols for Wireless Position...
Sort
View
USS
2004
15 years 5 months ago
Autograph: Toward Automated, Distributed Worm Signature Detection
Today's Internet intrusion detection systems (IDSes) monitor edge networks' DMZs to identify and/or filter malicious flows. While an IDS helps protect the hosts on its l...
Hyang-Ah Kim, Brad Karp
153
Voted
ICASSP
2010
IEEE
15 years 3 months ago
Implementation of cooperative communications using software defined radios
—Cooperative communications leverages the spatial diversity available in a wireless network enabling multiple radio nodes work together to improve the overall system performance....
Michael Knox, Elza Erkip
150
Voted
PUC
2007
116views more  PUC 2007»
15 years 3 months ago
Periodic properties of user mobility and access-point popularity
Understanding user mobility and its effect on access points (APs) is important in designing location-aware systems and wireless networks. Although various studies of wireless netwo...
Minkyong Kim, David Kotz
161
Voted
ICC
2007
IEEE
157views Communications» more  ICC 2007»
15 years 10 months ago
Cross-Layer Design of Uplink Multiple-Antenna Interference Cancellation for WLAN with CSMA/CA in Open Access Networks
Abstract— The potential of multi-antenna interference cancellation receiver algorithms for increasing the uplink throughput in WLAN systems such as 802.11 is investigated. The me...
Alexandr M. Kuzminskiy, Hamid Reza Karimi
153
Voted
GLOBECOM
2007
IEEE
15 years 10 months ago
End-to-End Throughput-Aware Channel Assignment in Multi-Radio Wireless Mesh Networks
— 1 Wireless mesh networks are deployed as broadband backbones to provide ubiquitous wireless access for residents and local businesses. Utilizing multiple channels has the poten...
Fei Ye, Qing Chen, Zhisheng Niu