Results 231 to 240 of about 236,756 (293)
Performance Analysis and Design Principles of Wireless Mutual Broadcast Using Heterogeneous Transmit Power for Proximity-Aware Services. [PDF]
Kwon T, Lee H.
europepmc +1 more source
Enhancing network lifetime in WSNs through coot algorithm-based energy management model. [PDF]
Shinde N, Patil DVH.
europepmc +1 more source
Autonomous password generation and setting system with cosmic coding and transfer (COSMOCAT) and cosmic time calibrator (CTC). [PDF]
Tanaka HKM+9 more
europepmc +1 more source
Multi-Task Learning for Joint Indoor Localization and Blind Channel Estimation in OFDM Systems. [PDF]
Molina MC, Ahriz I, Zerioul L, Terré M.
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
2021
The proliferation of communication devices and networks is the result of the exponential development of wireless components for computing devices. This development allowed the diffusion of services and new alternatives for users to interact with new technologies, with each other, and with the development of social networks and applications to stream ...
Diego Alexis Romero Rincón+5 more
openaire +2 more sources
The proliferation of communication devices and networks is the result of the exponential development of wireless components for computing devices. This development allowed the diffusion of services and new alternatives for users to interact with new technologies, with each other, and with the development of social networks and applications to stream ...
Diego Alexis Romero Rincón+5 more
openaire +2 more sources
On network coding in wireless ad-hoc networks
International Journal of Ad Hoc and Ubiquitous Computing, 2005Network coding has been proven to be an effective way to achieve the maximum flow capacity in a multicast network, which is bounded by the famous maximum-flow minimum-cut theorem. This technique is specially fit for some new types of network, e.g., ad-hoc, sensor network etc.
Jingyao Zhang, Pingyi Fan
openaire +3 more sources
Security in wireless ad hoc network
International Journal of Internet Protocol Technology, 2017The mobile ad hoc network is open medium, easy to deploy and free of the centralised control network. But these features of mobile ad hoc network come along with security attacks, such as black hole attack and grey hole attack. In black hole attack malicious node degrades security and performance of network.
Sachin D. Ubarhande+2 more
openaire +2 more sources
Priority Scheduling in Wireless Ad Hoc Networks
Wireless Networks, 2002Ad hoc networks formed without the aid of any established infrastructure are typically multi-hop networks. Location dependent contention and hidden terminal problem make priority scheduling in multi-hop networks significantly different from that in wireless LANs.
Xue Yang, Nitin H. Vaidya
openaire +3 more sources
Routing and scheduling in wireless ad hoc networks
2009 IEEE International Workshop on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, 2009Computing capacity bounds of ad hoc networks, as well as optimizing radio resource allocation in order to approach those bounds is a hard task that have recently attracted the interest of the research community. In this paper we address the problem of jointly optimizing the routing of flows, the transmission scheduling over wireless links along the ...
A. Capone+3 more
openaire +4 more sources
Security in wireless ad-hoc networks – A survey
Computer Communications, 2014Pervasive mobile and low-end wireless technologies, such as radio-frequency identification (RFID), wireless sensor networks and the impending vehicular ad-hoc networks (VANETs), make the wireless scenario exciting and in full transformation. For all the above (and similar) technologies to fully unleash their potential in the industry and society, there
Di Pietro R+3 more
openaire +2 more sources