Sciweavers

3793 search results - page 611 / 759
» The wireless synchronization problem
Sort
View
IJNSEC
2010
143views more  IJNSEC 2010»
13 years 4 months ago
A New Secure Remote User Authentication Scheme with Smart Cards
Remote user authentication scheme is one of the simplest and the most convenient authentication mechanisms to deal with secret data over insecure networks. These types of schemes ...
Manoj Kumar
TIT
2010
110views Education» more  TIT 2010»
13 years 4 months ago
On network interference management
We study two building-block models of interference-limited wireless networks, motivated by the problem of joint Peer-to-Peer and Wide Area Network design. In the first case, a sin...
Aleksandar Jovicic, Hua Wang, Pramod Viswanath
TWC
2010
13 years 4 months ago
Distributed Routing Algorithms for Underwater Acoustic Sensor Networks
Underwater Acoustic Sensor Networks (UW-ASNs) consist of devices with sensing, processing, and communication capabilities that are deployed underwater to perform collaborative moni...
Dario Pompili, Tommaso Melodia, Ian F. Akyildiz
ICASSP
2011
IEEE
13 years 1 months ago
Network-MIMO backhauling for QOS-constrained relay transmission
1 A relay station (RS)-based cellular system deployment is considered, where multiple base stations (BS) cooperate in the BSRS in-band transmission for the downlink. With the joint...
Josep Vidal, Adrian Agustin, Sandra Lagen, Eduard ...
ICASSP
2011
IEEE
13 years 1 months ago
Predictive modeling of the spatiotemporal evolution of an environmental hazard and its sensor network implementation
Predicting accurately the spatiotemporal evolution of a diffusive environmental hazard is of paramount importance for its effective containment. We approximate the front line of a...
Dimitris V. Manatakis, Elias S. Manolakos