Sciweavers

1512 search results - page 220 / 303
» Principles of IEEE 802.11s
Sort
View
VTC
2006
IEEE
15 years 10 months ago
Successive Interference Cancellation in Clipped and Product Combining aided FFH Multi-User Systems
— In this contribution, we propose two successive interference cancellation (SIC) schemes for a fast frequency hopping (FFH) multiple access (MA) system using M-ary frequency shi...
Sohail Ahmed, Lie-Liang Yang, Lajos Hanzo
SASN
2006
ACM
15 years 10 months ago
Impact of optimal MAC layer attacks on the network layer
Node misbehavior in wireless ad hoc networks leads to sudden unpredictable changes in network topology, resulting in fluctuation of traffic load and capacity for already existin...
Svetlana Radosavac, John S. Baras, George V. Moust...
CVPR
2010
IEEE
15 years 9 months ago
3D Morphable Model Construction for Robust Ear and Face Recognition
Recent work suggests that the human ear varies significantly between different subjects and can be used for identification. In principle, therefore, using ears in addition to the f...
John D. Bustard, Mark S. Nixon
ACSAC
2005
IEEE
15 years 9 months ago
User-Centered Security: Stepping Up to the Grand Challenge
User-centered security has been identified as a grand challenge in information security and assurance. It is on the brink of becoming an established subdomain of both security and...
Mary Ellen Zurko
APSEC
2005
IEEE
15 years 9 months ago
Metrics for Analyzing Module Interactions in Large Software Systems
We present a new set of metrics for analyzing the interaction between the modules of a large software system. We believe that these metrics will be important to any automatic or s...
Santonu Sarkar, Avinash C. Kak, N. S. Nagaraja