Works matching DE "WIRELESS communication system access control"
Results: 40
Medium access control schemes for flat mobile wireless sensor networks.
- Published in:
- IET Wireless Sensor Systems (Wiley-Blackwell), 2017, v. 7, n. 4, p. 105, doi. 10.1049/iet-wss.2016.0067
- By:
- Publication type:
- Article
EIMAC: a multi-channel MAC protocol towards energy efficiency and low interference for WBANs.
- Published in:
- IET Communications (Wiley-Blackwell), 2018, v. 12, n. 16, p. 1954, doi. 10.1049/iet-com.2017.1422
- By:
- Publication type:
- Article
Performance analysis of wireless ad-hoc network based on bidirectional full-duplex and saturated state.
- Published in:
- IET Communications (Wiley-Blackwell), 2018, v. 12, n. 12, p. 1422, doi. 10.1049/iet-com.2017.0448
- By:
- Publication type:
- Article
An Energy Saving Strategy for LTE-A Multiantenna Systems.
- Published in:
- Mobile Networks & Applications, 2015, v. 20, n. 5, p. 692, doi. 10.1007/s11036-015-0599-y
- By:
- Publication type:
- Article
Energy Conservation via Antenna Scheduling in Fiber-Connected Femto Base Stations.
- Published in:
- Mobile Networks & Applications, 2012, v. 17, n. 5, p. 685, doi. 10.1007/s11036-012-0395-x
- By:
- Publication type:
- Article
Astronics CSC Ships its 10,000th Cabin Wireless Access Point.
- Published in:
- EE: Evaluation Engineering, 2018, v. 57, n. 11, p. 4
- Publication type:
- Article
THE CREATION OF VALUE: THE VALUE CIRCLE AND EVOLVING MARKET STRUCTURES.
- Published in:
- Journal on Telecommunications & High Technology Law, 2013, v. 11, n. 1, p. 185
- By:
- Publication type:
- Article
Intelligent spectrum assignment and migration in cognitive radio network.
- Published in:
- EURASIP Journal on Wireless Communications & Networking, 2013, v. 2013, n. 1, p. 1, doi. 10.1186/1687-1499-2013-200
- By:
- Publication type:
- Article
A rapid cooperation-differentiated medium access control protocol with packet piggyback for multihop wireless networks.
- Published in:
- EURASIP Journal on Wireless Communications & Networking, 2013, v. 2013, n. 1, p. 1, doi. 10.1186/1687-1499-2013-264
- By:
- Publication type:
- Article
A Fully Integrated CMOS Security-Enhanced Passive RFID Tag.
- Published in:
- ETRI Journal, 2014, v. 36, n. 1, p. 141, doi. 10.4218/etrij.14.0112.0674
- By:
- Publication type:
- Article
Power Allocation Schemes For Downlink Cognitive Radio Networks With Opportunistic Sub-channel Access.
- Published in:
- KSII Transactions on Internet & Information Systems, 2012, v. 6, n. 7, p. 1777, doi. 10.3837/tiis.2012.07.003
- By:
- Publication type:
- Article
OPEN WIRELESS VS. LICENSED SPECTRUM: EVIDENCE FROM MARKET ADOPTION.
- Published in:
- Harvard Journal of Law & Technology, 2012, v. 26, n. 1, p. 69
- By:
- Publication type:
- Article
Advanced Heuristics for Selecting Friends in Social Internet of Things.
- Published in:
- Wireless Personal Communications, 2017, v. 97, n. 4, p. 4951, doi. 10.1007/s11277-017-4759-1
- By:
- Publication type:
- Article
Mitigation and Performance Analysis of Routing Protocols Under Black-Hole Attack in Vehicular Ad-hoc Network (VANET).
- Published in:
- Wireless Personal Communications, 2017, v. 97, n. 4, p. 5099, doi. 10.1007/s11277-017-4770-6
- By:
- Publication type:
- Article
Cognitive Bidirectional Buffer-Aided DF Relay Networks: Protocol design and Power Allocation.
- Published in:
- Wireless Personal Communications, 2017, v. 97, n. 4, p. 5213, doi. 10.1007/s11277-017-4776-0
- By:
- Publication type:
- Article
MMSMAC: A Multi-mode Medium Access Control Protocol for Wireless Sensor Networks with Latency and Energy-Awareness.
- Published in:
- Wireless Personal Communications, 2017, v. 96, n. 4, p. 4973, doi. 10.1007/s11277-016-3726-6
- By:
- Publication type:
- Article
Verifiable Outsourced Ciphertext-Policy Attribute-Based Encryption for Mobile Cloud Computing.
- Published in:
- KSII Transactions on Internet & Information Systems, 2017, v. 11, n. 6, p. 3254, doi. 10.3837/tiis.2017.06.024
- By:
- Publication type:
- Article
Media Disruption and Revolutionary Unrest: Evidence From Mubarak's Quasi-Experiment.
- Published in:
- Political Communication, 2014, v. 31, n. 1, p. 1, doi. 10.1080/10584609.2012.737439
- By:
- Publication type:
- Article
On the security of a lightweight authentication and encryption scheme for mobile ad hoc network.
- Published in:
- Security & Communication Networks, 2015, v. 8, n. 17, p. 3094, doi. 10.1002/sec.1234
- By:
- Publication type:
- Article
A transmission line decoupling technique for enhancement of port isolation of dual-band MIMO antennas.
- Published in:
- Journal of Electromagnetic Waves & Applications, 2018, v. 32, n. 10, p. 1195, doi. 10.1080/09205071.2018.1426501
- By:
- Publication type:
- Article
CALIDAD DEL SERVICIO RESTRINGIDA EN CAPACIDAD PARA LA SELECCIÓN DE ACCESS POINT EN REDES INALÁMBRICAS 802.11.
- Published in:
- Gerencia Tecnologica Informatica, 2015, v. 14, n. 38, p. 85
- By:
- Publication type:
- Article
Semi-Deterministic Construction of Scale-Free Networks with Designated Parameters.
- Published in:
- Journal of Interconnection Networks, 2018, v. 18, n. 1, p. -1, doi. 10.1142/S0219265918500019
- By:
- Publication type:
- Article
Detecting PUE Attack by Measuring Aberrational Node Behavior in CWSN.
- Published in:
- Journal of Interconnection Networks, 2018, v. 18, n. 1, p. -1, doi. 10.1142/S0219265918500044
- By:
- Publication type:
- Article
The multi-copy diversity for routing in sparse vehicular ad hoc networks.
- Published in:
- Telecommunication Systems, 2012, v. 50, n. 4, p. 297, doi. 10.1007/s11235-010-9405-0
- By:
- Publication type:
- Article
A novel software-defined wireless network architecture to improve ship area network performance.
- Published in:
- Journal of Supercomputing, 2017, v. 73, n. 7, p. 3149, doi. 10.1007/s11227-016-1930-5
- By:
- Publication type:
- Article
Design of MAC Layer Resource Allocation Schemes for IEEE 802.11ax: Future Directions.
- Published in:
- IETE Technical Review, 2018, v. 35, n. 1, p. 28, doi. 10.1080/02564602.2016.1242387
- By:
- Publication type:
- Article
A hybrid multi-channel MAC protocol for wireless ad hoc networks.
- Published in:
- Wireless Networks (10220038), 2015, v. 21, n. 2, p. 387, doi. 10.1007/s11276-014-0789-8
- By:
- Publication type:
- Article
An Efficient Remote User Password Authentication Scheme based on Rabin's Cryptosystem.
- Published in:
- Wireless Personal Communications, 2016, v. 90, n. 1, p. 217, doi. 10.1007/s11277-016-3342-5
- By:
- Publication type:
- Article
Ticket-Based Authentication for Fast Handover in Wireless Mesh Networks.
- Published in:
- Wireless Personal Communications, 2015, v. 85, n. 3, p. 1509, doi. 10.1007/s11277-015-2853-9
- By:
- Publication type:
- Article
Implementation and Evaluation of AREA-MAC Protocol on the DES-Testbed Platform.
- Published in:
- Wireless Personal Communications, 2015, v. 82, n. 1, p. 595, doi. 10.1007/s11277-014-2242-9
- By:
- Publication type:
- Article
Cognitive Radio Ad-Hoc Network Architectures: A Survey.
- Published in:
- Wireless Personal Communications, 2015, v. 81, n. 3, p. 1117, doi. 10.1007/s11277-014-2175-3
- By:
- Publication type:
- Article
Automatic Modulation Recognition in Wireless Multi-carrier Wireless Systems with Cepstral Features.
- Published in:
- Wireless Personal Communications, 2015, v. 81, n. 3, p. 1243, doi. 10.1007/s11277-014-2183-3
- By:
- Publication type:
- Article
Mutual Distance Bounding Protocol with Its Implementability Over a Noisy Channel and Its Utilization for Key Agreement in Peer-to-Peer Wireless Networks.
- Published in:
- Wireless Personal Communications, 2014, v. 77, n. 1, p. 127, doi. 10.1007/s11277-013-1498-9
- By:
- Publication type:
- Article
E-BEB: Enhanced Binary Exponential Backoff Algorithm for Multi-hop Wireless Ad-hoc Networks.
- Published in:
- Wireless Personal Communications, 2014, v. 76, n. 2, p. 193, doi. 10.1007/s11277-014-1685-3
- By:
- Publication type:
- Article
Next Generation Wireless Mobile System Efficient, Fair, Class Based Packet Scheduling Algorithm.
- Published in:
- Wireless Personal Communications, 2013, v. 72, n. 4, p. 1969, doi. 10.1007/s11277-013-1116-x
- By:
- Publication type:
- Article
Self-Management for Access Points Coverage Optimization and Mobility Agents Configuration in Future Access Networks.
- Published in:
- Wireless Personal Communications, 2013, v. 72, n. 1, p. 343, doi. 10.1007/s11277-013-1017-z
- By:
- Publication type:
- Article
A Novel Bandwidth Allocation Algorithm for IEEE 802.16 TDD Mode Wireless Access Networks.
- Published in:
- Wireless Personal Communications, 2012, v. 67, n. 3, p. 665, doi. 10.1007/s11277-011-0403-7
- By:
- Publication type:
- Article
Adoption of Vehicular Ad Hoc Networking Protocols by Networked Robots.
- Published in:
- Wireless Personal Communications, 2012, v. 64, n. 3, p. 489, doi. 10.1007/s11277-012-0598-2
- By:
- Publication type:
- Article
Agile Communication Middleware for Next-Generation Mobile Heterogeneous Networks.
- Published in:
- IEEE Software, 2014, v. 31, n. 2, p. 54, doi. 10.1109/MS.2013.144
- By:
- Publication type:
- Article
A Conflict Avoidance Scheme for WiMedia Wireless Home Networks.
- Published in:
- International Journal of Distributed Sensor Networks, 2013, p. 1, doi. 10.1155/2013/579795
- By:
- Publication type:
- Article