Sciweavers

1534 search results - page 85 / 307
» networking 2011
Sort
View
JNCA
2011
137views more  JNCA 2011»
14 years 6 months ago
Providing survivability against jamming attack for multi-radio multi-channel wireless mesh networks
Built upon a shared wireless medium, wireless mesh network is particularly vulnerable to jamming attacks. The ability to recover from attacks and maintain an acceptable level of s...
Shanshan Jiang, Yuan Xue
TAPAS
2011
286views Algorithms» more  TAPAS 2011»
14 years 6 months ago
Alternative Route Graphs in Road Networks
Every human likes choices. But today’s fast route planning algorithms usually compute just a single route between source and target. There are beginnings to compute alternative r...
Roland Bader, Jonathan Dees, Robert Geisberger, Pe...
TIT
2011
113views more  TIT 2011»
14 years 6 months ago
Asymptotic Capacity and Optimal Precoding in MIMO Multi-Hop Relay Networks
A multi-hop relaying system is analyzed where data sent by a multi-antenna source is relayed by successive multi-antenna relays until it reaches a multi-antenna destination. Assum...
Nadia Fawaz, Keyvan Zarifi, Mérouane Debbah...
TNN
2011
142views more  TNN 2011»
14 years 6 months ago
Optimum Spatio-Spectral Filtering Network for Brain-Computer Interface
—This paper proposes a feature extraction method for motor imagery brain–computer interface (BCI) using electroencephalogram. We consider the primary neurophysiologic phenomeno...
Haihong Zhang, Zhang Yang Chin, Kai Keng Ang, Cunt...
CORR
2011
Springer
169views Education» more  CORR 2011»
14 years 3 months ago
Percolation in the Secrecy Graph
— Secrecy graphs model the connectivity of wireless networks under secrecy constraints. Directed edges in the graph are present whenever a node can talk to another node securely ...
Amites Sarkar, Martin Haenggi