Sciweavers

JCM
2006
86views more  JCM 2006»
13 years 11 months ago
MAC Layer RFID Protocol for Low Cost Object Identification
In this paper, we introduce a novel medium access control (MAC) protocol for Radio Frequency Identification (RFID) systems. This protocol exploits the Markov Chain Model of Slotted...
Shweta Singh
JCM
2006
86views more  JCM 2006»
13 years 11 months ago
Dense RFID Reader Deployment in Europe using Synchronization
For a dense RFID reader deployment, such as in a warehouse, where hundreds of readers will be positioned in a building, the interference between all these readers must be studied c...
Kin Seong Leong, Mun Leng Ng, Alfio R. Grasso, Pet...
JCM
2006
124views more  JCM 2006»
13 years 11 months ago
Policy Defined Spectrum sharing and medium Access for Cognitive Radios
Spectrum regulation will undergo elementary changes in the near future allowing a less restricted and more flexible access to radio spectrum. Intelligent radios, socalled cognitive...
Lars Berlemann, Stefan Mangold, Guido R. Hiertz, B...
JCM
2006
60views more  JCM 2006»
13 years 11 months ago
A Harmful Interference Model for Unlicensed Device Operation in Licensed service Bands
Recent FCC proceedings have considered the notion of unlicensed device operation in licensed bands. Licensed users are concerned about harmful interference while unlicensed device ...
Timothy X. Brown
JCM
2006
144views more  JCM 2006»
13 years 11 months ago
Using Micro-Genetic Algorithms to Improve Localization in Wireless Sensor Networks
Wireless sensor networks are widely adopted in many location-sensitive applications including disaster management, environmental monitoring, military applications where the precise...
Vincent Tam, King-Yip Cheng, King-Shan Lui
JCM
2006
179views more  JCM 2006»
13 years 11 months ago
Collaborative Allocation of Orthogonal Frequency Division Multiplex Sub-Carriers using the Swarm Intelligence
Abstract-- Future generations of wireless systems require opportunistic spectrum access techniques to effectively detect and access temporarily unused spectrum bands. Cognitive rad...
J. C. Dunat, David Grandblaise, Christian Bonnet
42
Voted
JCM
2006
98views more  JCM 2006»
13 years 11 months ago
LITeTag: Design and Implementation of an RFID System for IT-based Port Logistics
Logistics has grown dramatically, especially where identifying, locating, or tracking objects in ports are important, because ports are gateways to extended markets. In this paper,...
Hyuntae Cho, Hoon Choi, Woonghyun Lee, Yeonsu Jung...
JCM
2006
118views more  JCM 2006»
13 years 11 months ago
Joint Optimization of Local and Fusion Rules in a Decentralized Sensor Network
Decentralized sensor networks are collections of individual local sensors that observe a common phenomenon, quantize their observations, and send this quantized information to a ce...
Nithya Gnanapandithan, Balasubramaniam Natarajan
JCM
2006
104views more  JCM 2006»
13 years 11 months ago
CLog: Low Cost Gigabit Full Packet Logging
Abstract-- Creating high quality network trace files is a difficult task to accomplish on a limited budget. High network speeds may overburden an individual system running packet l...
Chad D. Mano, Jeff Smith, Bill Bordogna, Andrew Ma...
JCM
2006
72views more  JCM 2006»
13 years 11 months ago
QoS Routing with Bandwidth and Hop-Count Consideration: A Performance Perspective
QoS Routing has been studied to provide evidence that it can increase network utilization compared to routing that is insensitive to QoS traffic requirements. However, because of i...
Bo Peng, Andrew H. Kemp, Said Boussakta