Sciweavers

2635 search results - page 486 / 527
» System Area Network Mapping
Sort
View
COMCOM
2008
91views more  COMCOM 2008»
13 years 8 months ago
A WEP post-processing algorithm for a Robust 802.11 WLAN implementation
Wired Equivalent Privacy (WEP) protocol used within the IEEE 802.11 standard has "major security flaws" thus wireless local area networks (WLANs) using the protocol are ...
Taskin Koçak, Mohit Jagetia
CORR
2010
Springer
77views Education» more  CORR 2010»
13 years 8 months ago
A Proximity based Retransmission Scheme for Power Line Ad-hoc LAN
Power line as an alternative for data transmission is being explored, and also being used to a certain extent. But from the data transfer point of view, power line, as a channel i...
Chitta Ranjan Singha
ECOI
2010
117views more  ECOI 2010»
13 years 8 months ago
Ensemble extraction for classification and detection of bird species
Advances in technology have enabled new approaches for sensing the environment and collecting data about the world. Once collected, sensor readings can be assembled into data stre...
Eric P. Kasten, Philip K. McKinley, Stuart H. Gage
ALIFE
2006
13 years 7 months ago
A Comprehensive Overview of the Applications of Artificial Life
We review the applications of artificial life (ALife), the creation of synthetic life on computers to study, simulate, and understand living systems. The definition and features of...
Kyung-Joong Kim, Sung-Bae Cho
JSAC
2008
133views more  JSAC 2008»
13 years 7 months ago
Distributed Rule-Regulated Spectrum Sharing
Dynamic spectrum access is a promising technique to use spectrum efficiently. Without being restricted to any prefixed spectrum bands, nodes choose operating spectrum ondemand. Suc...
Lili Cao, Haitao Zheng