Sciweavers

3680 search results - page 713 / 736
» cases 2010
Sort
View
WIOPT
2010
IEEE
14 years 8 months ago
On maximizing collaboration in Wireless Mesh Networks without monetary incentives
—In distributed network settings, where nodes are not under the control of a single administrative entity, the fulfillment of fundamental network operations is heavily dependent...
Gabriel Popa, Éric Gourdin, Franck Legendre...
WIOPT
2010
IEEE
14 years 8 months ago
Performance tuning of Infrastructure-Mode wireless LANs
—Conventional wisdom about 802.11 WLANs dictates that as the number of active users increases, the contention windows (CW) of all the contending users needs to increase to preven...
Yigal Bejerano, Hyoung-Gyu Choi, Seung-Jae Han, Th...
WIOPT
2010
IEEE
14 years 8 months ago
Resource allocation for cross-layer utility maximization in multi-hop wireless networks in the presence of self interference
Abstract—The cross-layer utility maximization problem subject to stability constraints is considered for a multi-hop wireless network. A time slotted network, where the channel g...
Chathuranga Weeraddana, Marian Codreanu, Matti Lat...
CORR
2010
Springer
219views Education» more  CORR 2010»
14 years 8 months ago
Cooperative Algorithms for MIMO Interference Channels
Interference alignment is a transmission technique for exploiting all available degrees of freedom in the symmetric frequency- or time-selective interference channel with an arbit...
Steven W. Peters, Robert W. Heath Jr.
ACSAC
2010
IEEE
14 years 8 months ago
Conficker and beyond: a large-scale empirical study
Conficker [26] is the most recent widespread, well-known worm/bot. According to several reports [16, 28], it has infected about 7 million to 15 million hosts and the victims are s...
Seungwon Shin, Guofei Gu