Sciweavers

439 search results - page 37 / 88
» Channel Modeling of Wireless Networks in Tunnels
Sort
View
ISCC
2002
IEEE
147views Communications» more  ISCC 2002»
14 years 1 months ago
Self-securing ad hoc wireless networks
Mobile ad hoc networking offers convenient infrastructureless communication over the shared wireless channel. However, the nature of ad hoc networks makes them vulnerable to secur...
Haiyun Luo, Petros Zerfos, Jiejun Kong, Songwu Lu,...
ICC
2007
IEEE
129views Communications» more  ICC 2007»
14 years 2 months ago
Closed-Form Expressions for the Outage and Error Probabilities of Decode-and-Forward Relaying in Dissimilar Rayleigh Fading Chan
—User cooperation protocols, where mobile stations relay signals to the final destination, have been proposed for wireless networks. A general mathematical probability model is ...
Jeremiah Hu, Norman C. Beaulieu
WCNC
2008
IEEE
14 years 2 months ago
An Analytical Performance Model of Opportunistic Spectrum Access in a Military Environment
— In an opportunistic spectrum sharing system, secondary users equipped with cognitive radios opportunistically access spectrum that is not being used by the primary users, i.e.,...
Shensheng Tang, Brian L. Mark
WCNC
2008
IEEE
14 years 2 months ago
Modeling an Opportunistic Spectrum Sharing System with a Correlated Arrival Process
— In an opportunistic spectrum sharing (OSS) wireless network there are two types of users: primary users and secondary users. The primary users own the license for the system ba...
Shensheng Tang, Brian L. Mark
CORR
2011
Springer
207views Education» more  CORR 2011»
13 years 2 days ago
Ergodic Transmission Capacity of Wireless Ad Hoc Networks with Interference Management
Most work on wireless network throughput ignores the temporal correlation inherent to wireless channels because it degrades tractability. To better model and quantify the temporal...
Chun-Hung Liu, Jeffrey G. Andrews