Sciweavers

5054 search results - page 989 / 1011
» simulation 2008
Sort
View
SUTC
2008
IEEE
14 years 2 months ago
A Cloaking Algorithm Based on Spatial Networks for Location Privacy
Most of research efforts have elaborated on k-anonymity for location privacy. The general architecture for implementing k-anonymity is that there is one trusted server (referred t...
Po-Yi Li, Wen-Chih Peng, Tsung-Wei Wang, Wei-Shinn...
TRIDENTCOM
2008
IEEE
14 years 2 months ago
Virtual integrated TCP testbed (VITT)
Research on TCP performance relies either on simulation programs, which run on a single machine, or on the use of real testbeds, where different machines represent different netwo...
Carlo Caini, Rosario Firrincieli, Renzo Davoli, Da...
VTC
2008
IEEE
107views Communications» more  VTC 2008»
14 years 2 months ago
TOA Estimation Enhancement based on Blind Calibration of Synthetic Arrays
—The accuracy of Time of Arrival (TOA) measurements is significantly compromised due to the multipath components which coexist with the desired Line of Sight (LOS) components in ...
Ali Broumandan, John Nielsen, Gérard Lachap...
VTC
2008
IEEE
102views Communications» more  VTC 2008»
14 years 2 months ago
Channel Prediction Aided Multiuser Transmission in SDMA
— Transmit preprocessing employed at the basestation (BS) has been proposed for simplifying the design of the mobile receiver. Provided that the channel impulse response (CIR) of...
Wei Liu, Lie-Liang Yang, Lajos Hanzo
VTC
2008
IEEE
137views Communications» more  VTC 2008»
14 years 2 months ago
A Multi-Hop Polling Service with Bandwidth Request Aggregation in IEEE 802.16j Networks
— The IEEE 802.16j protocol for a multi-hop relay (MMR) WiMAX network is being developed to increase data rates and extend service coverage as an enhancement of existing WiMAX st...
Chun Nie, Thanasis Korakis, Shivendra S. Panwar