Sciweavers

4340 search results - page 707 / 868
» Designing for change
Sort
View
TWC
2008
127views more  TWC 2008»
15 years 4 months ago
Energy-Delay Analysis of MAC Protocols in Wireless Networks
In this paper the tradeoff between energy and delay for wireless networks is studied. A network using a request-to-send (RTS) and clear-to-send (CTS) type medium access control (M...
Shih Yu Chang, Wayne E. Stark, Achilleas Anastasop...
TWC
2008
123views more  TWC 2008»
15 years 4 months ago
Block diagonal geometric mean decomposition (BD-GMD) for MIMO broadcast channels
In recent years, the research on multiple-input multiple-output (MIMO) broadcast channels has attracted much interest, especially since the discovery of the broadcast channel capac...
Shaowei Lin, Winston W. L. Ho, Ying-Chang Liang
WINET
2008
100views more  WINET 2008»
15 years 4 months ago
SOLONet: Sub-optimal location-aided overlay network for MANETs
Overlay networks have made it easy to implement multicast functionality in wireless ad hoc networks. Their flexibility to adapt to different environments has helped in their stead...
Abhishek P. Patil, Yunhao Liu, Li Xiao, Abdol-Hoss...
CERA
2004
93views more  CERA 2004»
15 years 4 months ago
Virtual-Build-to-Order as a Mass Customization Order Fulfilment Model
: Virtual-build-to-order (VBTO) is a form of order fulfilment system in which the producer has the ability to search across the entire pipeline of finished stock, products in produ...
Philip G. Brabazon, Bart L. MacCarthy
ADHOC
2007
134views more  ADHOC 2007»
15 years 4 months ago
Threshold password authentication against guessing attacks in Ad hoc networks
Password authentication has been accepted as one of the commonly used solutions in network environment to protect resources from unauthorized access. The emerging mobile Ad hoc ne...
Zhenchuan Chai, Zhenfu Cao, Rongxing Lu