Branding/Logomark minus Citation Combined Shape Icon/Bookmark-empty Icon/Copy Icon/Collection Icon/Close Copy 7 no author result Created with Sketch. Icon/Back Created with Sketch.
Loading Scinapse...
  • References (0)
  • Cited By (2516)
References0
Cited By2516
Published on Oct 25, 2006
La facilite de deploiement des reseaux ad hoc s'avere utile lorsque la mise en place d'une infrastucture est impossible. L'objectif du routage est de trouver les chemins tout en considerant les contraintes de bande passante et de dynamicite de la topologie. Dans cette these, nous nous sommes interesses a l'adaptation du type de routage selon les conditions de mobilite et de densite du reseau. Nous proposons une methode d'auto-adaptation du mode de routage en fonction de la mobilite et de la dens...
Published on Oct 14, 2010 in Energy-Efficient Computing and Networking
Sándor Plósz2
Estimated H-index: 2
(Budapest University of Technology and Economics),
István Moldován7
Estimated H-index: 7
(Budapest University of Technology and Economics)
+ 1 AuthorsAndreas Foglar (Lantiq)
Energy management is important not only for the homes, but also for the energy providers. With the ever-increasing broadband penetration it becomes possible the information exchange between the energy provider and customer, and a smart home management system. In this paper, we present a practical smart home system that serves as platform for efficient metering and communication within the household. The interconnection of the home appliances and the home network is realized by light-weight, feat...
Source Cite
Published on Jan 1, 2001
Zabih Ghassemlooy31
Estimated H-index: 31
(Sheffield Hallam University),
Andrew Hayes6
Estimated H-index: 6
Wireless networks offer the user increased mobility and flexibility, allowing information to be accessed or exchanged anywhere, without the need for a physical connection to a network. Early wireless radio LAN products operated in the unlicensed 900 MHz and 2.4 GHz Industrial-Scientific-Medical (ISM) bands. However, the bandwidths available at these frequencies are limited, and must be shared with other products on the market, such as cordless telephones, baby monitors and microwave ovens, which...
1 Citations
Published on Aug 30, 2013
ABSTRACT Performance Analysis of Different Schemes for Transmission of Watermarked Medical images over Fading Channels Praveen Kumar Korrai In this thesis, we investigate different types of robust schemes for transmission of medical images with concealed patient information as a watermark. In these schemes, spatial domain digital watermarking technique is adapted to embed the patient information as a watermark into the lower order bits of the medical images to reduce the storage and transmission...
Published on Jan 1, 2012
Lei Lei3
Estimated H-index: 3
(Nanjing University of Aeronautics and Astronautics),
Xianzhi Jiang + 1 AuthorsWeikang Liu (Nanjing University of Aeronautics and Astronautics)
In this paper, we focus on improving MACA-P performance in multi-hop ad hoc networks. Based on the analysis of the collision problems of the distributed coordination function (DCF) and MACA-P in multi-hop ad hoc networks, we propose an adaptive collision avoidance scheme (ACAS). ACAS mainly improves MACA-P by adaptively adjusting the control gap of the master transmission based on the conditions of the master transmission. Also, a new hybrid confirmation mechanism is presented, which, together w...
Source Cite
Published on Jan 1, 2014
Pieter A. J. Nuyts7
Estimated H-index: 7
(Katholieke Universiteit Leuven),
Patrick Reynaert19
Estimated H-index: 19
(Katholieke Universiteit Leuven),
Wim Dehaene33
Estimated H-index: 33
(Katholieke Universiteit Leuven)
This chapter gives an overview of different fully or partially digital transmitter architectures that have been presented in literature. These are classified according to different properties, and the main advantages and disadvantages for each type are investigated. This will motivate the use of continuous-time PWM-based polar transmitter architectures, which are the subject of the remainder of this work.
Source Cite
Published on Jan 1, 2012
Ling Dong1
Estimated H-index: 1
(Shanghai Jiao Tong University),
Kefei Chen19
Estimated H-index: 19
(Shanghai Jiao Tong University)
Formal methods are natural extensions to informal ones that have been used to analyze cryptographic protocols. First, some famous formalisms such as BAN logic, model checking and strand space are briefly introduced; then a belief multiset formalism is put forward based on the trusted freshness notion in Chapters 4, 5 and also 6, and the formalism is simple and precise for automation of security analysis.
Source Cite
Published on Aug 22, 2011
Sławomir Nowak4
Estimated H-index: 4
,
Mateusz Nowak6
Estimated H-index: 6
,
Paweł Foremski1
Estimated H-index: 1
We present a new synchronization method for parallel discrete event simulation for wireless networks. The method merges paradigms of timestepped and event-driven simulations to achieve reduction of messages exchanged between local processes of simulation. The method is particularly suitable for wireless network simulation, in which objects share the same physical medium and parallel simulation involves a significant overhead for interprocess communication. The article describes the method and co...
4 Citations Source Cite
Published on Jan 1, 2005
Xiaozhen Cao1
Estimated H-index: 1
(University of Calgary),
Guangwei Bai5
Estimated H-index: 5
(University of Calgary),
Carey L. Williamson32
Estimated H-index: 32
(University of Calgary)
18 Citations
Published on Jan 1, 2014
Kamal Kant Sharma1
Estimated H-index: 1
(Krishna Institute of Engineering and Technology),
Mukul Aggarwal1
Estimated H-index: 1
(Krishna Institute of Engineering and Technology),
Neha Yadav1
Estimated H-index: 1
(Krishna Institute of Engineering and Technology)
Inter-vehicle communications have great potential to induce great interest in research and industry. Vehicular ad hoc networks (VANETs) may significantly improve passenger safety and comfort. The deployment of VANETs is a challenging task in weakly interconnected and in highly overloaded networks both. A good back off technique can reduce a large number of collisions in the MAC layer I VANET. This will reduce the collision probability and hence increases the utilization of network resources. A u...
2 Citations Source Cite
View next paperPerformance analysis of the ieee 802