Sciweavers

9832 search results - page 1858 / 1967
» Wireless mesh networking
Sort
View
CORR
2010
Springer
189views Education» more  CORR 2010»
14 years 10 months ago
Approaching Throughput-optimality in Distributed CSMA Scheduling Algorithms with Collisions
Abstract--It was shown recently that carrier sense multiple access (CSMA)-like distributed algorithms can achieve the maximal throughput in wireless networks (and task processing n...
Libin Jiang, Jean C. Walrand
AUTOMATICA
2006
84views more  AUTOMATICA 2006»
14 years 10 months ago
Optimal control of LTI systems over unreliable communication links
In this paper, optimal control of linear time-invariant (LTI) systems over unreliable communication links is studied. The motivation of the problem comes from growing applications...
Orhan C. Imer, Serdar Yüksel, Tamer Basar
JSAC
2008
108views more  JSAC 2008»
14 years 10 months ago
Collision-aware design of rate adaptation for multi-rate 802.11 WLANs
One of the key challenges in designing a rate adaptation scheme for IEEE 802.11 wireless LANs (WLANs) is to differentiate bit errors from link-layer collisions. Many recent rate a...
Jaehyuk Choi, Jongkeun Na, Yeon-sup Lim, Kihong Pa...
ENTCS
2007
158views more  ENTCS 2007»
14 years 10 months ago
Abstraction and Completeness for Real-Time Maude
ion and Completeness for Real-Time Maude Peter Csaba ¨Olveczky a,b and Jos´e Meseguer b a Department of Informatics, University of Oslo b Department of Computer Science, Universi...
Peter Csaba Ölveczky, José Meseguer
SCN
2008
Springer
157views Communications» more  SCN 2008»
14 years 10 months ago
Insider attack attribution using signal strength-based hyperbolic location estimation
A rogue insider, in a wireless network, is an authenticated member that exploits possession of a valid identity in order to launch an attack. A typical example is the transmission...
Christine Laurendeau, Michel Barbeau
« Prev « First page 1858 / 1967 Last » Next »