Sciweavers

177 search results - page 9 / 36
» jsac 2006
Sort
View
JSAC
2010
91views more  JSAC 2010»
13 years 5 months ago
Constructing low-connectivity and full-coverage three dimensional sensor networks
Abstract—Low-connectivity and full-coverage three dimensional Wireless Sensor Networks (WSNs) have many real-world applications. By low connectivity, we mean there are at least k...
Chuanlin Zhang, Xiaole Bai, Jin Teng, Dong Xuan, W...
JSAC
2010
77views more  JSAC 2010»
13 years 5 months ago
MMS: An autonomic network-layer foundation for network management
Abstract—Networks cannot be managed without communication among geographically distributed network devices and control agents. Unfortunately, computer networks today lack an auto...
Hemant Gogineni, Albert G. Greenberg, David A. Mal...
JSAC
2008
141views more  JSAC 2008»
13 years 6 months ago
On cooperative source transmission with partial rate and power control
The problem of transmitting a Gaussian source over a half-duplex fading relay channel with limited channel state feedback is studied. It is shown that under a short-term power cons...
Thanh Tùng Kim, Mikael Skoglund, Giuseppe C...
JSAC
2008
95views more  JSAC 2008»
13 years 5 months ago
Cognitive Medium Access: Constraining Interference Based on Experimental Models
In this paper we design a cognitive radio that can coexist with multiple parallel WLAN channels while abiding by an interference constraint. The interaction between both systems is...
Stefan Geirhofer, Lang Tong, Brian M. Sadler
JSAC
2006
100views more  JSAC 2006»
13 years 6 months ago
RFID security and privacy: a research survey
This paper surveys recent technical research on the problems of privacy and security for radio frequency identification (RFID). RFID tags are small, wireless devices that help iden...
Ari Juels