Sciweavers

4690 search results - page 930 / 938
» An operational semantics for Scheme
Sort
View
COMCOM
2007
95views more  COMCOM 2007»
13 years 7 months ago
Key management for long-lived sensor networks in hostile environments
Large-scale wireless sensor networks (WSNs) are highly vulnerable to attacks because they consist of numerous resource-constrained devices and communicate via wireless links. Thes...
Michael Chorzempa, Jung Min Park, Mohamed Eltoweis...
CORR
2007
Springer
134views Education» more  CORR 2007»
13 years 7 months ago
Rate-Constrained Wireless Networks with Fading Channels: Interference-Limited and Noise-Limited Regimes
A network of n wireless communication links is considered in a Rayleigh fading environment. It is assumed that each link can be active and transmit with a constant power P or rema...
Masoud Ebrahimi, Amir K. Khandani
IVC
2006
227views more  IVC 2006»
13 years 7 months ago
Automatic registration of overlapping 3D point clouds using closest points
While the SoftAssign algorithm imposes a two-way constraint embedded into the deterministic annealing scheme and the EMICP algorithm imposes a one-way constraint, they represent t...
Yonghuai Liu
JNW
2008
177views more  JNW 2008»
13 years 7 months ago
Design and Evaluation of a Novel HIP-Based Network Mobility Protocol
The rapid growth of IP-based mobile telecommunication technologies in the past few years has revealed situations where not only a single node but an entire network moves and change...
Szabolcs Nováczki, László Bok...
JSAC
2008
151views more  JSAC 2008»
13 years 7 months ago
Joint Beamforming and Power Allocation for Multiple Access Channels in Cognitive Radio Networks
A cognitive radio (CR) network is often described as a secondary network operating in a frequency band originally licensed/allocated to a primary network consisting of one or multi...
Lan Zhang, Ying-Chang Liang, Yan Xin