Sciweavers

46 search results - page 4 / 10
» Modeling and performance analysis of an improved DCF-based m...
Sort
View
CORR
2010
Springer
225views Education» more  CORR 2010»
13 years 7 months ago
Analysis of the Security of BB84 by Model Checking
Quantum Cryptography or Quantum key distribution (QKD) is a technique that allows the secure distribution of a bit string, used as key in cryptographic protocols. When it was note...
Mohamed Elboukhari, Mostafa Azizi, Abdelmalek Aziz...
ISCAS
2006
IEEE
162views Hardware» more  ISCAS 2006»
14 years 1 months ago
Silicon neurons that phase-lock
Abstract—We present a silicon neuron with a dynamic, active leak that enables precise spike-timing with respect to a time-varying input signal. Our neuron models the mammalian bu...
J. H. Wittig Jr., Kwabena Boahen
COMCOM
2006
165views more  COMCOM 2006»
13 years 7 months ago
Analysis of a topology control paradigm in WLAN/WPAN environments
The coordinated coexistence of WLANs and WPANs in a dual-mode network is a recently introduced idea and is expected to increase the overall system performance by allowing for the ...
Athanasios Vaios, Konstantinos Oikonomou, Ioannis ...
PEWASUN
2005
ACM
14 years 1 months ago
An error model for inter-vehicle communications in highway scenarios at 5.9GHz
The design and evaluation of Inter-Vehicle Communication (IVC) protocols rely much on the accurate and efficient computational simulations. For simulations of Medium Access Contro...
Yunpeng Zang, Lothar Stibor, Georgios Orfanos, Shu...
MOBIHOC
2008
ACM
14 years 7 months ago
Dynamic packet fragmentation for wireless channels with failures
It was shown recently [7?9], under quite general conditions, that retransmission-based protocols may result in power-law delays and possibly zero throughput even if the distributi...
Predrag R. Jelenkovic, Jian Tan