• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 4,546
Next 10 →

RESEARCH IN RADIO FREQUENCY INTERFERENCE MITIGATION

by Jacob Lee Campbell, Brigham Young University, Jacob Lee Campbell, Date Brian, D. Jeffs, Date Michael, A. Jensen, Brigham Young University, Michael A. Jensen, Alan R. Parkinson, Jacob Lee Campbell , 2005
"... of a thesis submitted by ..."
Abstract - Add to MetaCart
of a thesis submitted by

Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems

by Stephen A. Weis, Sanjay E. Sarma, Ronald L. Rivest, Daniel W. Engels , 2003
"... Like many technologies, low-cost Radio Frequency Identification (RFID) systems will become pervasive in our daily lives when affixed to everyday consumer items as "smart labels". While yielding great productivity gains, RFID systems may create new threats to the security and privacy of ..."
Abstract - Cited by 311 (5 self) - Add to MetaCart
Like many technologies, low-cost Radio Frequency Identification (RFID) systems will become pervasive in our daily lives when affixed to everyday consumer items as "smart labels". While yielding great productivity gains, RFID systems may create new threats to the security and privacy

RFID security and privacy: A research survey

by Ari Juels - ISBN 978-89-5519-136-3 -88- Feb. 17-20, 2008 ICACT 2008 , 2006
"... Abstract—This paper surveys recent technical research on the problems of privacy and security for radio frequency identification (RFID). RFID tags are small, wireless devices that help identify objects and people. Thanks to dropping cost, they are likely to proliferate into the billions in the next ..."
Abstract - Cited by 353 (6 self) - Add to MetaCart
Abstract—This paper surveys recent technical research on the problems of privacy and security for radio frequency identification (RFID). RFID tags are small, wireless devices that help identify objects and people. Thanks to dropping cost, they are likely to proliferate into the billions in the next

Cooperative sensing among cognitive radios

by Shridhar Mubaraq Mishra, Anant Sahai, Robert W. Brodersen - In Proc. of the IEEE International Conference on Communications (ICC , 2006
"... Abstract — Cognitive Radios have been advanced as a technology for the opportunistic use of under-utilized spectrum since they are able to sense the spectrum and use frequency bands if no Primary user is detected. However, the required sensitivity is very demanding since any individual Radio might f ..."
Abstract - Cited by 289 (15 self) - Add to MetaCart
Abstract — Cognitive Radios have been advanced as a technology for the opportunistic use of under-utilized spectrum since they are able to sense the spectrum and use frequency bands if no Primary user is detected. However, the required sensitivity is very demanding since any individual Radio might

Achievable Rates in Cognitive Radio Channels

by Natasha Devroye, Patrick Mitran, Vahid Tarokh - IEEE Trans. Inf. Theory , 2006
"... Cognitive radio promises a low cost, highly flexible alternative to the classic single frequency band, single protocol wireless device. By sensing and adapting to its environment, such a device is able to fill voids in the wireless spectrum and dramatically increase spectral efficiency. In this pape ..."
Abstract - Cited by 274 (46 self) - Add to MetaCart
Cognitive radio promises a low cost, highly flexible alternative to the classic single frequency band, single protocol wireless device. By sensing and adapting to its environment, such a device is able to fill voids in the wireless spectrum and dramatically increase spectral efficiency

Topology Control in Wireless Ad Hoc and Sensor Networks

by Paolo Santi - ACM Computing Surveys , 2005
"... Topology Control (TC) is one of the most important techniques used in wireless ad hoc and sensor networks to reduce energy consumption (which is essential to extend the network operational time) and radio interference (with a positive effect on the network traffic carrying capacity). The goal of thi ..."
Abstract - Cited by 304 (4 self) - Add to MetaCart
Topology Control (TC) is one of the most important techniques used in wireless ad hoc and sensor networks to reduce energy consumption (which is essential to extend the network operational time) and radio interference (with a positive effect on the network traffic carrying capacity). The goal

Optimum Combining in Digital Mobile Radio with Cochannel Interference

by Jack H. Winters - IEEE JSAC , 1984
"... Abstract-This paper studies optimum signal combining for space diver-sity reception in cellular mobile radio systems. With optimum combining, the signals received by the antennas are weighted and combined to maxi-mize the output signal-to-interference-plus-noise ratio. Thus, with cochan-ne1 interfe ..."
Abstract - Cited by 200 (3 self) - Add to MetaCart
Abstract-This paper studies optimum signal combining for space diver-sity reception in cellular mobile radio systems. With optimum combining, the signals received by the antennas are weighted and combined to maxi-mize the output signal-to-interference-plus-noise ratio. Thus, with cochan-ne1

On the Performance of Ad Hoc Networks with Beamforming Antennas

by Ram Ramanathan - ACM MobiHoc , 2001
"... Beamforming antennas have the potential to provide a fundamental breakthrough in ad hoc network capacity. We present a broad-based examination of this potential, focusing on exploiting the longer ranges as well as the reduced interference that beamforming antennas can provide. We consider a number o ..."
Abstract - Cited by 287 (6 self) - Add to MetaCart
Beamforming antennas have the potential to provide a fundamental breakthrough in ad hoc network capacity. We present a broad-based examination of this potential, focusing on exploiting the longer ranges as well as the reduced interference that beamforming antennas can provide. We consider a number

The feasibility of launching and detecting jamming attacks in wireless networks

by Wenyuan Xu, Yanyong Zhang, Timothy Wood - In ACM MOBIHOC , 2005
"... Wireless networks are built upon a shared medium that makes it easy for adversaries to launch jamming-style attacks. These attacks can be easily accomplished by an adversary emitting radio frequency signals that do not follow an underlying MAC protocol. Jamming attacks can severely interfere with th ..."
Abstract - Cited by 265 (15 self) - Add to MetaCart
Wireless networks are built upon a shared medium that makes it easy for adversaries to launch jamming-style attacks. These attacks can be easily accomplished by an adversary emitting radio frequency signals that do not follow an underlying MAC protocol. Jamming attacks can severely interfere

Radio frequency interference mitigation on the Very Small Array

by Alan Joseph Stemmons, Alan J. Stemmons, Date Karl, F. Warnick, Date David, G. Long, Brigham Young University, Date Brian, D. Jeffs, R. Parkinson, Alan J. Stemmons , 2009
"... This Thesis is brought to you for free and open access by BYU ScholarsArchive. It has been accepted for inclusion in All Theses and Dissertations by an ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
This Thesis is brought to you for free and open access by BYU ScholarsArchive. It has been accepted for inclusion in All Theses and Dissertations by an
Next 10 →
Results 1 - 10 of 4,546
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University