Sciweavers

10044 search results - page 2003 / 2009
» Authentication in Wireless Networks
Sort
View
CORR
2010
Springer
205views Education» more  CORR 2010»
13 years 8 months ago
Competition with Dynamic Spectrum Leasing
Dynamic spectrum leasing can greatly enhance the spectrum efficiency and encourage more flexible services in the spectrum market. This paper presents a detailed analytical study of...
Lingjie Duan, Jianwei Huang, Biying Shou
CORR
2006
Springer
112views Education» more  CORR 2006»
13 years 8 months ago
Pull-Based Data Broadcast with Dependencies: Be Fair to Users, not to Items
Broadcasting is known to be an efficient means of disseminating data in wireless communication environments (such as Satellite, mobile phone networks,...). It has been recently ob...
Julien Robert, Nicolas Schabanel
DSONLINE
2006
108views more  DSONLINE 2006»
13 years 8 months ago
Middleware for Protocol-Based Coordination in Mobile Applications
We propose extending these middleware approaches with suitable abstractions to better support protocolbased interaction in mobile applications. To test our approach, we created Obj...
Kurt Schelfthout, Danny Weyns, Tom Holvoet
JSAC
2008
140views more  JSAC 2008»
13 years 8 months ago
Optimality and Complexity of Pure Nash Equilibria in the Coverage Game
In this paper, we investigate the coverage problem in wireless sensor networks using a game theory method. We assume that nodes are randomly scattered in a sensor field and the goa...
Xin Ai, Vikram Srinivasan, Chen-Khong Tham
JSAC
2008
125views more  JSAC 2008»
13 years 8 months ago
Optimal Competitive Algorithms for Opportunistic Spectrum Access
We consider opportunistic spectrum access (OSA) strategies for a transmitter in a multichannel wireless system, where a channel may or may not be available and the transmitter must...
Nicholas B. Chang, Mingyan Liu
« Prev « First page 2003 / 2009 Last » Next »