Sciweavers

814 search results - page 157 / 163
» Solutions to Hidden Terminal Problems in Wireless Networks
Sort
View
SERSCISA
2009
Springer
14 years 2 months ago
ATTENTION: ATTackEr Traceback Using MAC Layer AbNormality DetecTION
Denial-of-Service (DoS) and Distributed DoS (DDoS) attacks can cause serious problems in wireless networks due to limited network and host resources. Attacker traceback is a promi...
Yongjin Kim
BMCBI
2011
13 years 3 months ago
NClassG+: A classifier for non-classically secreted Gram-positive bacterial proteins
Background: Most predictive methods currently available for the identification of protein secretion mechanisms have focused on classically secreted proteins. In fact, only two met...
Daniel Restrepo-Montoya, Camilo Pino, Luis F. Ni&n...
INFOCOM
2008
IEEE
14 years 2 months ago
Towards a Theory of Robust Localization Against Malicious Beacon Nodes
—Localization in the presence of malicious beacon nodes is an important problem in wireless networks. Although significant progress has been made on this problem, some fundament...
Sheng Zhong, Murtuza Jadliwala, Shambhu J. Upadhya...
CDC
2009
IEEE
177views Control Systems» more  CDC 2009»
14 years 1 months ago
A control theoretic approach to noncooperative game design
— This paper investigates design of noncooperative games from a control theoretic perspective. Pricing mechanisms are used as a design tool to ensure that the Nash equilibrium of...
Tansu Alpcan, Lacra Pavel, Nem Stefanovic
JSAC
2008
106views more  JSAC 2008»
13 years 8 months ago
Enhanced multiuser random beamforming: dealing with the not so large number of users case
We consider the downlink of a wireless system with an M-antenna base station and K single-antenna users. A limited feedback-based scheduling and precoding scenario is considered th...
Marios Kountouris, David Gesbert, Thomas Sälz...