Skip to main content

Articles

Page 67 of 86

  1. MAC layer jamming is a common attack on wireless networks, which is easy to launch by the attacker and which is very effective in disrupting the service provided by the network. Most of the current MAC protoco...

    Authors: Zhichu Lin and Mihaela van der Schaar
    Citation: EURASIP Journal on Wireless Communications and Networking 2010 2010:453947
  2. We propose an improved method for designing unequal error protection (UEP) low-density parity-check (LDPC) codes. The method is based on density evolution. The degree distribution with the best UEP properties ...

    Authors: Sara Sandberg
    Citation: EURASIP Journal on Wireless Communications and Networking 2010 2010:423989
  3. Maximum likelihood-based (ML) receiver structures are derived for the decoding of the downlink control channels in the new long-term evolution (LTE) standard based on multiple-input and multiple-output (MIMO) ...

    Authors: S. J. Thiruvengadam and Louay M. A. Jalloul
    Citation: EURASIP Journal on Wireless Communications and Networking 2010 2010:914934
  4. A practical multiuser cooperative transmission scheme denoted as Virtual Maximum Ratio Transmission (VMRT) for multiple-input multiple-output-orthogonal frequency division multiple access (MIMO-OFDMA) relay-based...

    Authors: Víctor P. Gil Jiménez, Carlos Ribeiro, Atilio Gameiro and Ana García Armada
    Citation: EURASIP Journal on Wireless Communications and Networking 2010 2010:764784
  5. We present a novel model of IEEE 802.11 EDCA with support for analysing networks with misbehaving nodes. In particular, we consider backoff misbehaviour. Firstly, we verify the model by extensive simulation an...

    Authors: Szymon Szott, Marek Natkaniec and AndrzejR Pach
    Citation: EURASIP Journal on Wireless Communications and Networking 2010 2010:209895
  6. This paper proposes an opportunistic multicast scheduling scheme using erasure-correction coding to jointly explore the multicast gain and multiuser diversity. For each transmission, the proposed scheme sends ...

    Authors: Quang Le-Dang and Tho Le-Ngoc
    Citation: EURASIP Journal on Wireless Communications and Networking 2010 2010:595431
  7. Recent advances in wireless networking technologies, along with ubiquitous sensing and computing, have brought significant convenience for location-based services. The localization issue in wireless sensor net...

    Authors: Honglong Chen, Wei Lou and Zhi Wang
    Citation: EURASIP Journal on Wireless Communications and Networking 2010 2010:981280
  8. MAC protocol controls the activity of wireless radio of sensor nodes directly so that it is the major consumer of sensor energy and the energy efficiency of MAC protocol makes a strong impact on the network pe...

    Authors: Haigang Gong, Ming Liu, Guihai Chen and Xue Zhang
    Citation: EURASIP Journal on Wireless Communications and Networking 2010 2010:169132
  9. With the rapid development and growth of the mobile industry, a considerable amount of mobile applications and services are available, which involve Internet scale data collections. Meanwhile, it has a tremend...

    Authors: Chaokun Wang, Peng Zou, Zhang Liu and Jianmin Wang
    Citation: EURASIP Journal on Wireless Communications and Networking 2010 2011:837209
  10. We formulate the problem of distributed throughput-efficient sensing in cognitive radio (CR) networks as a dynamic coalition formation game based on a Markovian model. The proposed coalition formation enables ...

    Authors: Zaheer Khan, Janne Lehtomäki, Marian Codreanu, Matti Latva-aho and LuizA DaSilva
    Citation: EURASIP Journal on Wireless Communications and Networking 2010 2010:653913
  11. TCP unfairness problem in access networks using the 802.11 has been studied by many researchers. Their solutions required that the existing MAC protocol be modified. However, since they did not consider the ca...

    Authors: Mojtaba Seyedzadegan and Mohamed Othman
    Citation: EURASIP Journal on Wireless Communications and Networking 2010 2010:593497
  12. This paper investigates a new transmission technique for cognitive access in multiple-input multiple-output (MIMO) uplink channels with waterfilling power allocation- (WPA-) based primary transmission. The pro...

    Authors: Ioannis Krikidis
    Citation: EURASIP Journal on Wireless Communications and Networking 2010 2010:465157
  13. The multipath components of superwideband (2–17.2 GHz) nonline-of-sight channel responses measured inside several buildings are stable along sections that are 27 cm long on average with a standard deviation of...

    Authors: Dana Porrat, Aawatif Hayar and Yuval Serfaty
    Citation: EURASIP Journal on Wireless Communications and Networking 2010 2010:145247
  14. Effectively sharing channels among secondary users (SUs) is one of the greatest challenges in cognitive radio network (CRN). In the past, many studies have proposed channel selection schemes at the physical or...

    Authors: Shih-Ho Chen, Tein-Yaw Chung and Yung-Mu Chen
    Citation: EURASIP Journal on Wireless Communications and Networking 2010 2010:598534
  15. Key encryption technology is a basic technique for protecting the secrecy of transmitted data among sensor nodes in wireless sensor networks. However, sensor nodes are inherently limited by insufficient hardwa...

    Authors: Jen-Yan Huang, I-En Liao and Hao-Wen Tang
    Citation: EURASIP Journal on Wireless Communications and Networking 2010 2011:296704
  16. Opportunistic networking represents a promising paradigm for support of communications, specifically in infrastructureless scenarios such as remote areas communications. In principle in opportunistic environme...

    Authors: MarcelC Castro, Laura Galluccio, Andreas Kassler and Corrado Rametta
    Citation: EURASIP Journal on Wireless Communications and Networking 2010 2011:892038
  17. White space, unused TV spectrum, will be allowed for unlicensed use by wireless communication devices "the so called white space applications (WSAs)." WSAs retrieve a location-based spectrum map, a list of ope...

    Authors: Seungil Yoon, Kyutae Lim and Jongman Kim
    Citation: EURASIP Journal on Wireless Communications and Networking 2010 2010:870976
  18. In a wireless network, the problem of self-interference arises when a node transmits and receives simultaneously in the same frequency band. So far only two extreme approaches to circumvent this problem were thor...

    Authors: Pradeep Chathuranga Weeraddana, Marian Codreanu, Matti Latva-aho and Anthony Ephremides
    Citation: EURASIP Journal on Wireless Communications and Networking 2010 2010:513952
  19. We focus on mobile P2P multicast, in which mobile end nodes not only act as receivers but also relay the received stream forward to others. In mobile P2P multicast, negative effects caused by the change of ava...

    Authors: Hiroyuki Kubo, Ryoichi Shinkuma and Tatsuro Takahashi
    Citation: EURASIP Journal on Wireless Communications and Networking 2010 2011:389058
  20. In opportunistic networks, the availability of an end-to-end path is no longer required. Instead opportunistic networks may take advantage of temporary connectivity opportunities. Opportunistic networks presen...

    Authors: Tanguy Pérennou, Anna Brunstrom, Tomas Hall, Johan Garcia and Per Hurtig
    Citation: EURASIP Journal on Wireless Communications and Networking 2010 2011:347107
  21. Seamless handover across different access technologies is very important in the future wireless networks. To optimize vertical handover in heterogeneous networks, IEEE 802.21 standard defines Media Independent...

    Authors: Guangsong Li, Jianfeng Ma and Qi Jiang
    Citation: EURASIP Journal on Wireless Communications and Networking 2010 2010:249169
  22. Opportunistic networking aims at exploiting sporadic radio links to improve the connectivity of multihop networks and to foster data transmissions. The broadcast nature of wireless channels is an important fea...

    Authors: Ruifeng Zhang, Jean-Marie Gorce, Olivier Berder and Olivier Sentieys
    Citation: EURASIP Journal on Wireless Communications and Networking 2010 2011:265083
  23. With limited coverage of wireless networks and frequent roaming of mobile users, providing a seamless communication service poses a technical challenge. In our previous research, we presented a supernode syste...

    Authors: Hany Samuel, Weihua Zhuang and Bruno Preiss
    Citation: EURASIP Journal on Wireless Communications and Networking 2010 2011:402989
  24. Telecommunications networks are composed of functional layers acting in cascade. Quality of Service (QoS) derives from the action of each layer that must assure a specific level of quality to the upper layer i...

    Authors: M. Marchese and M. Mongelli
    Citation: EURASIP Journal on Wireless Communications and Networking 2010 2010:961690
  25. Channel access scheduling is one of the key components in the design of multihop wireless mesh networks (WMNs). This paper addresses the allocation/demand mismatch problem observed in oblivious WMN channel acc...

    Authors: Miray Kas, Ibrahim Korpeoglu and Ezhan Karasan
    Citation: EURASIP Journal on Wireless Communications and Networking 2010 2010:312828
  26. This paper deals with the nonlinear distortion (NLD) effects of high power amplifiers (HPAs) on direct sequence-code division multiple access systems. Such a distortion drastically degrades the system performa...

    Authors: Tarek K. Helaly, Richard M. Dansereau and Mohamed El-Tanany
    Citation: EURASIP Journal on Wireless Communications and Networking 2010 2010:945427
  27. With the rapid development of the mobile communication and wireless access technologies, the interworking of heterogeneous networks turns into a trend and various wireless networks are getting connected with t...

    Authors: Xinghua Li, Jianfeng Ma, YoungHo Park and Li Xu
    Citation: EURASIP Journal on Wireless Communications and Networking 2010 2011:867315
  28. Mobile ad hoc networks involve communications over a shared wireless channel without any centralized infrastructure. Consequently, in an optimal solution, management and security services depend exclusively on...

    Authors: P. Caballero-Gil and C. Hernández-Goya
    Citation: EURASIP Journal on Wireless Communications and Networking 2010 2011:935457
  29. This paper addresses the issues of interference management among Low Data Rate (LDR) and High Data Rate (HDR) WPAN air interfaces that are located in close-proximity (up to 10 cm) and eventually on the same mu...

    Authors: Marco Monti, Mauro De Sanctis, Ernestina Cianca, Marina Ruggieri and Ramjee Prasad
    Citation: EURASIP Journal on Wireless Communications and Networking 2010 2010:473534
  30. Information security in infrastructureless wireless sensor networks (WSNs) is one of the most important research challenges. In these networks, sensor nodes are typically sprinkled liberally in the field in or...

    Authors: Reza Azarderskhsh and Arash Reyhani-Masoleh
    Citation: EURASIP Journal on Wireless Communications and Networking 2010 2011:893592
  31. Radio transmitters capable of transforming variable envelope signals into constant envelope signals can be associated with high-efficiency switched mode power amplifiers. One of the techniques providing this c...

    Authors: MarthaLiliana Suarez Penaloza, Václav Valenta, Geneviève Baudoin, Martine Villegas and Roman Maršálek
    Citation: EURASIP Journal on Wireless Communications and Networking 2010 2010:979120
  32. We present CARNIVORE, a system for in situ, unobtrusive monitoring of cryptic, difficult-to-catch/observe wildlife in their natural habitat. CARNIVORE is a network of mobile and static nodes with sensing, proc...

    Authors: Matthew Rutishauser, Vladislav Petkov, Jay Boice, Katia Obraczka, Patrick Mantey, Terrie M. Williams and Christopher C. Wilmers
    Citation: EURASIP Journal on Wireless Communications and Networking 2010 2011:968046
  33. Authors: Qilian Liang (EURASIP Member), Xiuzhen Cheng, Scott. C. H. Huang, Sherwood W. Samn, Lingming Wang and Zheng Zhou
    Citation: EURASIP Journal on Wireless Communications and Networking 2010 2010:948604
  34. Various detection methods including the maximum likelihood (ML) detection have been studied for multiple-input multiple-output (MIMO) systems. While it is usually assumed that the number of independent data sy...

    Authors: Lin Bai, Chen Chen and Jinho Choi
    Citation: EURASIP Journal on Wireless Communications and Networking 2010 2010:932904
  35. A two-hop amplify and forward (AF) relay system is considered where source and destination are each equipped with multiple antennas while the relay has a single antenna. Orthogonal space-time block coding (OST...

    Authors: Guangping Li, StevenD Blostein and Jiayin Qin
    Citation: EURASIP Journal on Wireless Communications and Networking 2010 2010:649541
  36. We describe a new class of lightweight, symmetric-key digital certificates called extended TESLA certificates and a source authentication protocol for wireless group communication that is based on the certific...

    Authors: Ayan Roy-Chowdhury and John S. Baras
    Citation: EURASIP Journal on Wireless Communications and Networking 2010 2011:392529
  37. We have been looking at the properties of physical configurations that occur in nature in order to characterize, predict, and control network robustness in dynamic communication networks. Our framework is base...

    Authors: Jaime Llorca, Stuart D. Milner and Christopher C. Davis
    Citation: EURASIP Journal on Wireless Communications and Networking 2010 2010:548016
  38. Today, many wireless devices are mobile and battery powered. Based on the fact that battery capacity is still limited, energy saving is an important issue in wireless communication. Meanwhile, the number of wi...

    Authors: Jinglong Zhou, Martin Jacobsson and Ignas Niemegeers
    Citation: EURASIP Journal on Wireless Communications and Networking 2010 2010:920131
  39. To achieve off-line delegation for mobile readers, we propose a delegation protocol for mobile RFID allowing its readers access to specific tags through back-end server. That is to say, reader-tag mutual authe...

    Authors: Ming Hour Yang
    Citation: EURASIP Journal on Wireless Communications and Networking 2010 2010:170150
  40. Future wireless networks like mobile ad hoc networks and wireless mesh networks are expected to play important role in demanding communications such as mission critical communications. MANETs are ideal for eme...

    Authors: IoannisG Askoxylakis, Theo Tryfonas, John May, Vasilios Siris and Apostolos Traganitis
    Citation: EURASIP Journal on Wireless Communications and Networking 2010 2011:807684
  41. Security is a fundamental issue for promising applications in a VANET. Designing a secure protocol for a VANET that accommodates efficiency, privacy, and traceability is difficult because of the contradictions...

    Authors: Hyoung-Kee Choi, In-Hwan Kim and Jae-Chern Yoo
    Citation: EURASIP Journal on Wireless Communications and Networking 2010 2011:716794
  42. The bit error rate (BER) of multiple-input multiple-output (MIMO) orthogonal frequency-division multiplexing (OFDM) systems with carrier frequency offset and channel estimation errors is analyzed in this paper...

    Authors: Zhongshan Zhang, Lu Zhang, Mingli You and Ming Lei
    Citation: EURASIP Journal on Wireless Communications and Networking 2010 2010:176083
  43. Fair and efficient scheduling is a key issue in cross-layer design for wireless communication systems, such as 3GPP LTE and WiMAX. However, few works have considered the multiaccess of the traffic with differe...

    Authors: Bo Bai, Wei Chen, Zhigang Cao and Khaled Ben Letaief
    Citation: EURASIP Journal on Wireless Communications and Networking 2010 2010:168357
  44. We consider the problem of choosing the data flow rate on a wireless link with randomly varying channel gain, to optimally trade off average transmit power and the average utility of the smoothed data flow rat...

    Authors: Ekine Akuiyibo and Stephen Boyd
    Citation: EURASIP Journal on Wireless Communications and Networking 2010 2010:815213
  45. The problem of choosing the best forwarders in Delay-Tolerant Networks (DTNs) is crucial for minimizing the delay in packet delivery and for keeping the amount of generated traffic under control. In this paper...

    Authors: Flavio Fabbri and Roberto Verdone
    Citation: EURASIP Journal on Wireless Communications and Networking 2010 2011:251408
  46. 6LoWPAN (IPv6 based Low-Power Personal Area Network) is a protocol specification that facilitates communication of IPv6 packets on top of IEEE 802.15.4 so that Internet and wireless sensor networks can be inte...

    Authors: Saima Zafar, Ali Hammad Akbar, Sana Jabbar and Noor M. Sheikh
    Citation: EURASIP Journal on Wireless Communications and Networking 2010 2010:936457
  47. Delay/disruption tolerant networking (DTN) technology is considered a new solution to highly stressed communications in space environments. To date, little work has been done in evaluating the effectiveness an...

    Authors: Ruhai Wang, Xuan Wu, Qinyu Zhang, Tarik Taleb, Zhensheng Zhang and Jia Hou
    Citation: EURASIP Journal on Wireless Communications and Networking 2010 2011:720671

Who reads the journal?

Learn more about the impact the EURASIP Journal on Wireless Communications and Networking has worldwide

Annual Journal Metrics

  • 2022 Citation Impact
    2.6 - 2-year Impact Factor
    2.5 - 5-year Impact Factor
    1.098 - SNIP (Source Normalized Impact per Paper)
    0.985 - SJR (SCImago Journal Rank)

    2023 Speed
    23 days submission to first editorial decision for all manuscripts (Median)
    157 days submission to accept (Median)

    2023 Usage 
    1,226,841 downloads
    99 Altmetric mentions 

Funding your APC

​​​​​​​Open access funding and policy support by SpringerOpen​​

​​​​We offer a free open access support service to make it easier for you to discover and apply for article-processing charge (APC) funding. Learn more here