Sciweavers

9832 search results - page 1908 / 1967
» Wireless mesh networking
Sort
View
COMCOM
2008
91views more  COMCOM 2008»
14 years 10 months ago
A WEP post-processing algorithm for a Robust 802.11 WLAN implementation
Wired Equivalent Privacy (WEP) protocol used within the IEEE 802.11 standard has "major security flaws" thus wireless local area networks (WLANs) using the protocol are ...
Taskin Koçak, Mohit Jagetia
CORR
2008
Springer
127views Education» more  CORR 2008»
14 years 10 months ago
Energy-Efficient Resource Allocation in Multiuser MIMO Systems: A Game-Theoretic Framework
This paper focuses on the cross-layer issue of resource allocation for energy efficiency in the uplink of a multiuser MIMO wireless communication system. Assuming that all of the ...
Stefano Buzzi, H. Vincent Poor, Daniela Saturnino
CORR
2008
Springer
159views Education» more  CORR 2008»
14 years 10 months ago
Compound Multiple Access Channels with Partial Cooperation
A two-user discrete memoryless compound multiple access channel with a common message and conferencing decoders is considered. The capacity region is characterized in the special ...
Osvaldo Simeone, Deniz Gündüz, H. Vincen...
CN
2006
98views more  CN 2006»
14 years 9 months ago
A performance analysis of context transfer protocols for QoS enabled internet services
In nowadays wireless networks, mobile users frequently access Internet services that are often based on information concerning the application context and service status. In prese...
Novella Bartolini, Emiliano Casalicchio
COMPSEC
2006
97views more  COMPSEC 2006»
14 years 9 months ago
Towards a location-based mandatory access control model
With the growing use of wireless networks and mobile devices, we are moving towards an era where location information will be necessary for access control. The use of location inf...
Indrakshi Ray, Mahendra Kumar
« Prev « First page 1908 / 1967 Last » Next »