Skip to main content

Articles

Page 66 of 86

  1. Spectrum sharing and multiple-access techniques are challenging matters for future wireless communication systems. Orthogonal frequency division multiplexing (OFDM) has been considered as the most important ph...

    Authors: Ayman Khalil, Matthieu Crussière and Jean-françois Hélard
    Citation: EURASIP Journal on Wireless Communications and Networking 2010 2010:598707
  2. The well-known assumption of horizontal plane wave propagation is investigated and evidence suggests that elevation plays a crucial role in defining the spatial correlation between signals on adjacent antenna ...

    Authors: Konstantinos Mammasis and RobertW Stewart
    Citation: EURASIP Journal on Wireless Communications and Networking 2010 2010:307265
  3. IEEE 802.16 uses the code division multiple access (CDMA) method as the channel access method to decrease the collision probability of data delivery. However, IEEE 802.16 does not regulate a ranging code alloc...

    Authors: Kuo-Chih Chu
    Citation: EURASIP Journal on Wireless Communications and Networking 2010 2010:391985
  4. We propose modified space-time-coding-based analog network coding (ANC) for multiple-relay network, termed space-time analog network coding (STANC). We present the performance and capacity analysis of the prop...

    Authors: ShujaatAliKhan Tanoli, Imran Khan, Nandana Rajatheva and Fumiyuki Adachi
    Citation: EURASIP Journal on Wireless Communications and Networking 2010 2010:232754
  5. The goal of this paper is to investigate the effect of channel side information on increasing the achievable rates of continuous power-limited non-Gaussian channels. We focus on the case where (1) there is imp...

    Authors: Behrooz Makki, Lotfollah Beygi and Thomas Eriksson
    Citation: EURASIP Journal on Wireless Communications and Networking 2010 2010:495014
  6. We propose two novel and computationally efficient metaheuristic algorithms based on Artificial Bee Colony (ABC) and Particle Swarm Optimization (PSO) principles for Multiuser Detection (MUD) in Turbo Trellis ...

    Authors: P. A. Haris, E. Gopinathan and C. K. Ali
    Citation: EURASIP Journal on Wireless Communications and Networking 2010 2010:473435
  7. Space-time focusing transmission in impulse-radio ultra-wideband (IR-UWB) systems resorts to the large number of resolvable paths to reduce the interpulse interference as well as the multiuser interference and...

    Authors: Yafei Tian and Chenyang Yang
    Citation: EURASIP Journal on Wireless Communications and Networking 2010 2010:678490
  8. We consider a network composed of two interfering point-to-point links where the two transmitters can exploit one common relay node to improve their individual transmission rate. Communications are assumed to ...

    Authors: Elena Veronica Belmega, Brice Djeumou and Samson Lasaulce
    Citation: EURASIP Journal on Wireless Communications and Networking 2010 2010:583462
  9. The communication protocol used is a key issue in order to make the most of the advantages of active RFID technologies. In this paper we introduce a carrier sense medium access data communication protocol that...

    Authors: Björn Nilsson, Lars Bengtsson and Bertil Svensson
    Citation: EURASIP Journal on Wireless Communications and Networking 2010 2010:432938
  10. It is known that the orthogonal multiple access (OMA) guarantees for homogeneous networks, where all users have almost the same received power, a higher degree of fairness (in rate) than that provided by succe...

    Authors: Seyed Alireza Razavi and Ciprian Doru Giurcăneanu
    Citation: EURASIP Journal on Wireless Communications and Networking 2010 2010:395763
  11. This paper presents a novel class-based fair code allocation (CFCA) protocol to support delay and rate guarantees for real-time flows and to provide fairness for non-real-time flows on the downlink of WCDMA- a...

    Authors: Narasimha Challa and Hasan Çam
    Citation: EURASIP Journal on Wireless Communications and Networking 2010 2010:738325
  12. We leverage RFID tag cooperation to enforce tampering detection. That is, we provide a set of probabilistic protocols that detect the absence of a tag from a system composed of a set of tags and a reader. Our ...

    Authors: Mauro Conti, Roberto Di Pietro and Angelo Spognardi
    Citation: EURASIP Journal on Wireless Communications and Networking 2010 2011:575171
  13. Alterations and unpredictability of the network topology in mobile ad hoc networks (MANETs) are less capable of ensuring the security of multicast data transmissions than in conventional networks. Despite the rec...

    Authors: Hua-Yi Lin and Tzu-Chiang Chiang
    Citation: EURASIP Journal on Wireless Communications and Networking 2010 2011:382701
  14. Energy efficiency is an essential requirement for wireless sensor networks while security must also be ensured for mission-critical applications. In this paper, we present an energy-efficient distributed deter...

    Authors: Xing Zhang, Jingsha He and Qian Wei
    Citation: EURASIP Journal on Wireless Communications and Networking 2010 2011:765143
  15. Cooperative schemes are promising solutions for cellular wireless systems to improve system fairness, extend coverage and increase capacity. The use of relays is of significant interest to allow radio access i...

    Authors: Sara Teodoro, Adão Silva, João M. Gil and Atílio Gameiro
    Citation: EURASIP Journal on Wireless Communications and Networking 2010 2010:414657
  16. The distributed space-time (frequency) coding and distributed channel turbo coding used independently represent two cooperative techniques that can provide increased throughput and spectral efficiency at an im...

    Authors: V Bota, Zs A Polgar, A Silva, S Teodoro, MP Stef, A Moço, A Botos and A Gameiro
    Citation: EURASIP Journal on Wireless Communications and Networking 2010 2010:327041
  17. MAC layer jamming is a common attack on wireless networks, which is easy to launch by the attacker and which is very effective in disrupting the service provided by the network. Most of the current MAC protoco...

    Authors: Zhichu Lin and Mihaela van der Schaar
    Citation: EURASIP Journal on Wireless Communications and Networking 2010 2010:453947
  18. We propose an improved method for designing unequal error protection (UEP) low-density parity-check (LDPC) codes. The method is based on density evolution. The degree distribution with the best UEP properties ...

    Authors: Sara Sandberg
    Citation: EURASIP Journal on Wireless Communications and Networking 2010 2010:423989
  19. Maximum likelihood-based (ML) receiver structures are derived for the decoding of the downlink control channels in the new long-term evolution (LTE) standard based on multiple-input and multiple-output (MIMO) ...

    Authors: S. J. Thiruvengadam and Louay M. A. Jalloul
    Citation: EURASIP Journal on Wireless Communications and Networking 2010 2010:914934
  20. A practical multiuser cooperative transmission scheme denoted as Virtual Maximum Ratio Transmission (VMRT) for multiple-input multiple-output-orthogonal frequency division multiple access (MIMO-OFDMA) relay-based...

    Authors: Víctor P. Gil Jiménez, Carlos Ribeiro, Atilio Gameiro and Ana García Armada
    Citation: EURASIP Journal on Wireless Communications and Networking 2010 2010:764784
  21. We present a novel model of IEEE 802.11 EDCA with support for analysing networks with misbehaving nodes. In particular, we consider backoff misbehaviour. Firstly, we verify the model by extensive simulation an...

    Authors: Szymon Szott, Marek Natkaniec and AndrzejR Pach
    Citation: EURASIP Journal on Wireless Communications and Networking 2010 2010:209895
  22. This paper proposes an opportunistic multicast scheduling scheme using erasure-correction coding to jointly explore the multicast gain and multiuser diversity. For each transmission, the proposed scheme sends ...

    Authors: Quang Le-Dang and Tho Le-Ngoc
    Citation: EURASIP Journal on Wireless Communications and Networking 2010 2010:595431
  23. Recent advances in wireless networking technologies, along with ubiquitous sensing and computing, have brought significant convenience for location-based services. The localization issue in wireless sensor net...

    Authors: Honglong Chen, Wei Lou and Zhi Wang
    Citation: EURASIP Journal on Wireless Communications and Networking 2010 2010:981280
  24. MAC protocol controls the activity of wireless radio of sensor nodes directly so that it is the major consumer of sensor energy and the energy efficiency of MAC protocol makes a strong impact on the network pe...

    Authors: Haigang Gong, Ming Liu, Guihai Chen and Xue Zhang
    Citation: EURASIP Journal on Wireless Communications and Networking 2010 2010:169132
  25. With the rapid development and growth of the mobile industry, a considerable amount of mobile applications and services are available, which involve Internet scale data collections. Meanwhile, it has a tremend...

    Authors: Chaokun Wang, Peng Zou, Zhang Liu and Jianmin Wang
    Citation: EURASIP Journal on Wireless Communications and Networking 2010 2011:837209
  26. We formulate the problem of distributed throughput-efficient sensing in cognitive radio (CR) networks as a dynamic coalition formation game based on a Markovian model. The proposed coalition formation enables ...

    Authors: Zaheer Khan, Janne Lehtomäki, Marian Codreanu, Matti Latva-aho and LuizA DaSilva
    Citation: EURASIP Journal on Wireless Communications and Networking 2010 2010:653913
  27. TCP unfairness problem in access networks using the 802.11 has been studied by many researchers. Their solutions required that the existing MAC protocol be modified. However, since they did not consider the ca...

    Authors: Mojtaba Seyedzadegan and Mohamed Othman
    Citation: EURASIP Journal on Wireless Communications and Networking 2010 2010:593497
  28. This paper investigates a new transmission technique for cognitive access in multiple-input multiple-output (MIMO) uplink channels with waterfilling power allocation- (WPA-) based primary transmission. The pro...

    Authors: Ioannis Krikidis
    Citation: EURASIP Journal on Wireless Communications and Networking 2010 2010:465157
  29. The multipath components of superwideband (2–17.2 GHz) nonline-of-sight channel responses measured inside several buildings are stable along sections that are 27 cm long on average with a standard deviation of...

    Authors: Dana Porrat, Aawatif Hayar and Yuval Serfaty
    Citation: EURASIP Journal on Wireless Communications and Networking 2010 2010:145247
  30. Effectively sharing channels among secondary users (SUs) is one of the greatest challenges in cognitive radio network (CRN). In the past, many studies have proposed channel selection schemes at the physical or...

    Authors: Shih-Ho Chen, Tein-Yaw Chung and Yung-Mu Chen
    Citation: EURASIP Journal on Wireless Communications and Networking 2010 2010:598534
  31. Key encryption technology is a basic technique for protecting the secrecy of transmitted data among sensor nodes in wireless sensor networks. However, sensor nodes are inherently limited by insufficient hardwa...

    Authors: Jen-Yan Huang, I-En Liao and Hao-Wen Tang
    Citation: EURASIP Journal on Wireless Communications and Networking 2010 2011:296704
  32. Opportunistic networking represents a promising paradigm for support of communications, specifically in infrastructureless scenarios such as remote areas communications. In principle in opportunistic environme...

    Authors: MarcelC Castro, Laura Galluccio, Andreas Kassler and Corrado Rametta
    Citation: EURASIP Journal on Wireless Communications and Networking 2010 2011:892038
  33. White space, unused TV spectrum, will be allowed for unlicensed use by wireless communication devices "the so called white space applications (WSAs)." WSAs retrieve a location-based spectrum map, a list of ope...

    Authors: Seungil Yoon, Kyutae Lim and Jongman Kim
    Citation: EURASIP Journal on Wireless Communications and Networking 2010 2010:870976
  34. In a wireless network, the problem of self-interference arises when a node transmits and receives simultaneously in the same frequency band. So far only two extreme approaches to circumvent this problem were thor...

    Authors: Pradeep Chathuranga Weeraddana, Marian Codreanu, Matti Latva-aho and Anthony Ephremides
    Citation: EURASIP Journal on Wireless Communications and Networking 2010 2010:513952
  35. We focus on mobile P2P multicast, in which mobile end nodes not only act as receivers but also relay the received stream forward to others. In mobile P2P multicast, negative effects caused by the change of ava...

    Authors: Hiroyuki Kubo, Ryoichi Shinkuma and Tatsuro Takahashi
    Citation: EURASIP Journal on Wireless Communications and Networking 2010 2011:389058
  36. In opportunistic networks, the availability of an end-to-end path is no longer required. Instead opportunistic networks may take advantage of temporary connectivity opportunities. Opportunistic networks presen...

    Authors: Tanguy Pérennou, Anna Brunstrom, Tomas Hall, Johan Garcia and Per Hurtig
    Citation: EURASIP Journal on Wireless Communications and Networking 2010 2011:347107
  37. Seamless handover across different access technologies is very important in the future wireless networks. To optimize vertical handover in heterogeneous networks, IEEE 802.21 standard defines Media Independent...

    Authors: Guangsong Li, Jianfeng Ma and Qi Jiang
    Citation: EURASIP Journal on Wireless Communications and Networking 2010 2010:249169
  38. Opportunistic networking aims at exploiting sporadic radio links to improve the connectivity of multihop networks and to foster data transmissions. The broadcast nature of wireless channels is an important fea...

    Authors: Ruifeng Zhang, Jean-Marie Gorce, Olivier Berder and Olivier Sentieys
    Citation: EURASIP Journal on Wireless Communications and Networking 2010 2011:265083
  39. With limited coverage of wireless networks and frequent roaming of mobile users, providing a seamless communication service poses a technical challenge. In our previous research, we presented a supernode syste...

    Authors: Hany Samuel, Weihua Zhuang and Bruno Preiss
    Citation: EURASIP Journal on Wireless Communications and Networking 2010 2011:402989
  40. Telecommunications networks are composed of functional layers acting in cascade. Quality of Service (QoS) derives from the action of each layer that must assure a specific level of quality to the upper layer i...

    Authors: M. Marchese and M. Mongelli
    Citation: EURASIP Journal on Wireless Communications and Networking 2010 2010:961690
  41. Channel access scheduling is one of the key components in the design of multihop wireless mesh networks (WMNs). This paper addresses the allocation/demand mismatch problem observed in oblivious WMN channel acc...

    Authors: Miray Kas, Ibrahim Korpeoglu and Ezhan Karasan
    Citation: EURASIP Journal on Wireless Communications and Networking 2010 2010:312828
  42. This paper deals with the nonlinear distortion (NLD) effects of high power amplifiers (HPAs) on direct sequence-code division multiple access systems. Such a distortion drastically degrades the system performa...

    Authors: Tarek K. Helaly, Richard M. Dansereau and Mohamed El-Tanany
    Citation: EURASIP Journal on Wireless Communications and Networking 2010 2010:945427
  43. With the rapid development of the mobile communication and wireless access technologies, the interworking of heterogeneous networks turns into a trend and various wireless networks are getting connected with t...

    Authors: Xinghua Li, Jianfeng Ma, YoungHo Park and Li Xu
    Citation: EURASIP Journal on Wireless Communications and Networking 2010 2011:867315
  44. Mobile ad hoc networks involve communications over a shared wireless channel without any centralized infrastructure. Consequently, in an optimal solution, management and security services depend exclusively on...

    Authors: P. Caballero-Gil and C. Hernández-Goya
    Citation: EURASIP Journal on Wireless Communications and Networking 2010 2011:935457

Who reads the journal?

Learn more about the impact the EURASIP Journal on Wireless Communications and Networking has worldwide

Annual Journal Metrics

  • 2022 Citation Impact
    2.6 - 2-year Impact Factor
    2.5 - 5-year Impact Factor
    1.098 - SNIP (Source Normalized Impact per Paper)
    0.985 - SJR (SCImago Journal Rank)

    2023 Speed
    23 days submission to first editorial decision for all manuscripts (Median)
    157 days submission to accept (Median)

    2023 Usage 
    1,226,841 downloads
    99 Altmetric mentions 

Funding your APC

​​​​​​​Open access funding and policy support by SpringerOpen​​

​​​​We offer a free open access support service to make it easier for you to discover and apply for article-processing charge (APC) funding. Learn more here