Sciweavers

13007 search results - page 2345 / 2602
» Wireless and Mobile Networking
Sort
View
134
Voted
HICSS
2003
IEEE
125views Biometrics» more  HICSS 2003»
15 years 9 months ago
Applying a Layered Policy Model to IP Based Voice Services
Traditionally, specific telecommunications services were essentially confined to certain types of networks; e.g., television over broadcast networks or cable and voice service ove...
Douglas C. Sicker
ICWN
2003
15 years 5 months ago
Providing Secondary Access in a Cellular Network
— Most wireless systems receive a license that gives them exclusive access to a block of spectrum. Exclusivity guarantees adequate quality of service, but it also leads to inef...
Sooksan Panichpapiboon, Jon M. Peha
133
Voted
MAM
2007
127views more  MAM 2007»
15 years 3 months ago
Indoor solar energy harvesting for sensor network router nodes
A unique method has been developed to scavenge solar energy from monocrystalline solar cells to power wireless router nodes that are used in indoor applications. This method elimi...
Abhiman Hande, Todd Polk, William Walker, Dinesh B...
110
Voted
ICCAD
2006
IEEE
116views Hardware» more  ICCAD 2006»
16 years 17 days ago
Enhanced error vector magnitude (EVM) measurements for testing WLAN transceivers
As wireless LAN devices become more prevalent in the consumer electronics market, there is an ever increasing pressure to reduce their overall cost. The test cost of such devices ...
Erkan Acar, Sule Ozev, Kevin B. Redmond
115
Voted
INFOCOM
2009
IEEE
15 years 10 months ago
Synchronized CSMA Contention: Model, Implementation and Evaluation
— A class of CSMA protocols used in a broad range of wireless applications uses synchronized contention where nodes periodically contend at intervals of fixed duration. While se...
Jing Shi, Ehsan Aryafar, Theodoros Salonidis, Edwa...
« Prev « First page 2345 / 2602 Last » Next »