Skip to main content

Articles

Page 67 of 86

  1. Information security in infrastructureless wireless sensor networks (WSNs) is one of the most important research challenges. In these networks, sensor nodes are typically sprinkled liberally in the field in or...

    Authors: Reza Azarderskhsh and Arash Reyhani-Masoleh
    Citation: EURASIP Journal on Wireless Communications and Networking 2010 2011:893592
  2. Radio transmitters capable of transforming variable envelope signals into constant envelope signals can be associated with high-efficiency switched mode power amplifiers. One of the techniques providing this c...

    Authors: MarthaLiliana Suarez Penaloza, Václav Valenta, Geneviève Baudoin, Martine Villegas and Roman Maršálek
    Citation: EURASIP Journal on Wireless Communications and Networking 2010 2010:979120
  3. We present CARNIVORE, a system for in situ, unobtrusive monitoring of cryptic, difficult-to-catch/observe wildlife in their natural habitat. CARNIVORE is a network of mobile and static nodes with sensing, proc...

    Authors: Matthew Rutishauser, Vladislav Petkov, Jay Boice, Katia Obraczka, Patrick Mantey, Terrie M. Williams and Christopher C. Wilmers
    Citation: EURASIP Journal on Wireless Communications and Networking 2010 2011:968046
  4. Authors: Qilian Liang (EURASIP Member), Xiuzhen Cheng, Scott. C. H. Huang, Sherwood W. Samn, Lingming Wang and Zheng Zhou
    Citation: EURASIP Journal on Wireless Communications and Networking 2010 2010:948604
  5. Various detection methods including the maximum likelihood (ML) detection have been studied for multiple-input multiple-output (MIMO) systems. While it is usually assumed that the number of independent data sy...

    Authors: Lin Bai, Chen Chen and Jinho Choi
    Citation: EURASIP Journal on Wireless Communications and Networking 2010 2010:932904
  6. A two-hop amplify and forward (AF) relay system is considered where source and destination are each equipped with multiple antennas while the relay has a single antenna. Orthogonal space-time block coding (OST...

    Authors: Guangping Li, StevenD Blostein and Jiayin Qin
    Citation: EURASIP Journal on Wireless Communications and Networking 2010 2010:649541
  7. We describe a new class of lightweight, symmetric-key digital certificates called extended TESLA certificates and a source authentication protocol for wireless group communication that is based on the certific...

    Authors: Ayan Roy-Chowdhury and John S. Baras
    Citation: EURASIP Journal on Wireless Communications and Networking 2010 2011:392529
  8. We have been looking at the properties of physical configurations that occur in nature in order to characterize, predict, and control network robustness in dynamic communication networks. Our framework is base...

    Authors: Jaime Llorca, Stuart D. Milner and Christopher C. Davis
    Citation: EURASIP Journal on Wireless Communications and Networking 2010 2010:548016
  9. Today, many wireless devices are mobile and battery powered. Based on the fact that battery capacity is still limited, energy saving is an important issue in wireless communication. Meanwhile, the number of wi...

    Authors: Jinglong Zhou, Martin Jacobsson and Ignas Niemegeers
    Citation: EURASIP Journal on Wireless Communications and Networking 2010 2010:920131
  10. To achieve off-line delegation for mobile readers, we propose a delegation protocol for mobile RFID allowing its readers access to specific tags through back-end server. That is to say, reader-tag mutual authe...

    Authors: Ming Hour Yang
    Citation: EURASIP Journal on Wireless Communications and Networking 2010 2010:170150
  11. Future wireless networks like mobile ad hoc networks and wireless mesh networks are expected to play important role in demanding communications such as mission critical communications. MANETs are ideal for eme...

    Authors: IoannisG Askoxylakis, Theo Tryfonas, John May, Vasilios Siris and Apostolos Traganitis
    Citation: EURASIP Journal on Wireless Communications and Networking 2010 2011:807684
  12. Security is a fundamental issue for promising applications in a VANET. Designing a secure protocol for a VANET that accommodates efficiency, privacy, and traceability is difficult because of the contradictions...

    Authors: Hyoung-Kee Choi, In-Hwan Kim and Jae-Chern Yoo
    Citation: EURASIP Journal on Wireless Communications and Networking 2010 2011:716794
  13. The bit error rate (BER) of multiple-input multiple-output (MIMO) orthogonal frequency-division multiplexing (OFDM) systems with carrier frequency offset and channel estimation errors is analyzed in this paper...

    Authors: Zhongshan Zhang, Lu Zhang, Mingli You and Ming Lei
    Citation: EURASIP Journal on Wireless Communications and Networking 2010 2010:176083
  14. Fair and efficient scheduling is a key issue in cross-layer design for wireless communication systems, such as 3GPP LTE and WiMAX. However, few works have considered the multiaccess of the traffic with differe...

    Authors: Bo Bai, Wei Chen, Zhigang Cao and Khaled Ben Letaief
    Citation: EURASIP Journal on Wireless Communications and Networking 2010 2010:168357
  15. We consider the problem of choosing the data flow rate on a wireless link with randomly varying channel gain, to optimally trade off average transmit power and the average utility of the smoothed data flow rat...

    Authors: Ekine Akuiyibo and Stephen Boyd
    Citation: EURASIP Journal on Wireless Communications and Networking 2010 2010:815213
  16. The problem of choosing the best forwarders in Delay-Tolerant Networks (DTNs) is crucial for minimizing the delay in packet delivery and for keeping the amount of generated traffic under control. In this paper...

    Authors: Flavio Fabbri and Roberto Verdone
    Citation: EURASIP Journal on Wireless Communications and Networking 2010 2011:251408
  17. 6LoWPAN (IPv6 based Low-Power Personal Area Network) is a protocol specification that facilitates communication of IPv6 packets on top of IEEE 802.15.4 so that Internet and wireless sensor networks can be inte...

    Authors: Saima Zafar, Ali Hammad Akbar, Sana Jabbar and Noor M. Sheikh
    Citation: EURASIP Journal on Wireless Communications and Networking 2010 2010:936457
  18. Delay/disruption tolerant networking (DTN) technology is considered a new solution to highly stressed communications in space environments. To date, little work has been done in evaluating the effectiveness an...

    Authors: Ruhai Wang, Xuan Wu, Qinyu Zhang, Tarik Taleb, Zhensheng Zhang and Jia Hou
    Citation: EURASIP Journal on Wireless Communications and Networking 2010 2011:720671
  19. This paper presents a stochastic modeling framework for store-and-forward packet routing in Wireless Body Area Networks (WBAN) with postural partitioning. A prototype WBANs has been constructed for experimentally...

    Authors: Muhannad Quwaider, Mahmoud Taghizadeh and Subir Biswas
    Citation: EURASIP Journal on Wireless Communications and Networking 2010 2011:280324
  20. In order to achieve seamless handover for real-time applications in the IP Multimedia Subsystem (IMS) of next generation network, a multiprotocol combined handover mechanism is proposed in this paper. We combi...

    Authors: Yuliang Tang, Chun-Cheng Lin, Guannan Kou and Der-Jiunn Deng
    Citation: EURASIP Journal on Wireless Communications and Networking 2010 2010:390706
  21. Offering secure and anonymous communications in mobile ad hoc networking environments is essential to achieve confidence and privacy, thus promoting widespread adoption of this kind of networks. In addition, s...

    Authors: Javier Campos, Carlos T. Calafate, Marga Nácher, Pietro Manzoni and Juan-Carlos Cano
    Citation: EURASIP Journal on Wireless Communications and Networking 2010 2011:437868
  22. Opportunistic wireless sensor networks (WSNs) have recently been proposed as solutions for many remote monitoring problems. Many such problems, including environmental monitoring, involve large deployment scen...

    Authors: Jorge M. Soares, Mirko Franceschinis, Rui M. Rocha, Wansheng Zhang and Maurizio A. Spirito
    Citation: EURASIP Journal on Wireless Communications and Networking 2010 2011:401802
  23. We consider the problem of throughput-optimal scheduling in wireless networks subject to interference constraints. We model the interference using a family of http://static-content.springer.com/image/art%3A10.1155%2F2010%2F418934/MediaObjects/13638_2010_Article_1902_IEq1_HTML.gif ...

    Authors: Changhee Joo, Gaurav Sharma, Ness B. Shroff and Ravi R. Mazumdar
    Citation: EURASIP Journal on Wireless Communications and Networking 2010 2010:418934
  24. We have suggested in a previous publication a method to estimate the Bit Error Rate (BER) of a digital communications system instead of using the famous Monte Carlo (MC) simulation. This method was based on th...

    Authors: Samir Saoudi, Thomas Derham, Tarik Ait-Idir and Patrice Coupe
    Citation: EURASIP Journal on Wireless Communications and Networking 2010 2010:372370
  25. Broadcast is used in wireless sensor networks for operations such as software updates, network queries, and command dissemination. Applications such as battlefield control and natural resource management requi...

    Authors: Vijay Sivaraman, Diethelm Ostry, Jaleel Shaheen, Antoni Junior Hianto and Sanjay Jha
    Citation: EURASIP Journal on Wireless Communications and Networking 2010 2011:695171
  26. Securing a wireless communication has generally a vital importance, particularly when this communication is in a hostile environment like in wireless sensor networks (WSNs). The problem is how to create crypto...

    Authors: M. -L. Messai, M. Aliouat and H. Seba
    Citation: EURASIP Journal on Wireless Communications and Networking 2010 2010:910695
  27. A backward compatible error-protection mechanism embedded into the H.264 (AVC or SVC) syntax is described. It consists of the addition into the H.264 bitstream of supplementary network abstraction layer (NAL) ...

    Authors: Catherine Lamy-Bergot and Benjamin Gadat
    Citation: EURASIP Journal on Wireless Communications and Networking 2010 2010:729695
  28. We provide regression analysis-based statistical models to explain the usage of wireless spectrum across four mid-size US cities in four frequency bands. Specifically, the variations in spectrum occupancy acro...

    Authors: Srikanth Pagadarai and AlexanderM Wyglinski
    Citation: EURASIP Journal on Wireless Communications and Networking 2010 2010:203178
  29. This paper presents a Wireless Information-Theoretic Security (WITS) scheme, which has been recently introduced as a robust physical layer-based security solution, especially for infrastructureless networks. A...

    Authors: Theofilos Chrysikos, Tasos Dagiuklas and Stavros Kotsopoulos
    Citation: EURASIP Journal on Wireless Communications and Networking 2010 2011:628747
  30. We present a mathematical model to study decentralized detection in clustered wireless sensor networks (WSNs). Sensors and fusion centers (FCs) are distributed with the aim of detecting an event of interest. S...

    Authors: Marco Martalò, Chiara Buratti, Gianluigi Ferrari and Roberto Verdone
    Citation: EURASIP Journal on Wireless Communications and Networking 2010 2010:174063
  31. We propose a new framework to study the performance of cellular networks using a fluid model and we derive from this model analytical formulas for interference, outage probability, and spatial outage probabili...

    Authors: Jean-Marc Kelif, Marceau Coupechoux and Philippe Godlewski
    Citation: EURASIP Journal on Wireless Communications and Networking 2010 2010:435189
  32. This paper considers base station cooperation as an interference management technique for the downlink of a WiMAX network (IEEE 802.16 standard) with frequency reuse factor of 1. A low-complexity cooperative t...

    Authors: Turgut Baris Tokel and Defne Aktas
    Citation: EURASIP Journal on Wireless Communications and Networking 2010 2010:527591
  33. Mashups are getting more complex with the addition of rich-media and real-time services. The new research challenges will be how to guarantee the quality of the aggregated services, and how to share them in a ...

    Authors: Hongguang Zhang, Zhenzhen Zhao, Shanmugalingam Sivasothy, Cuiting Huang and Noël Crespi
    Citation: EURASIP Journal on Wireless Communications and Networking 2010 2010:721312
  34. In this paper the problem of channel-aware opportunistic resource allocation for the downlink in CDMA wireless networks supporting simultaneously real-time multimedia and non-real-time data services is address...

    Authors: Timotheos Kastrinogiannis and Symeon Papavassiliou
    Citation: EURASIP Journal on Wireless Communications and Networking 2010 2010:375410
  35. The fact that the IEEE 802.15.4 MAC does not fully satisfy the strict wireless body sensor network (BSN) requirements in healthcare systems highlights the need for the design and analysis of new scalable MAC s...

    Authors: Begonya Otal, Luis Alonso and Christos Verikoukis
    Citation: EURASIP Journal on Wireless Communications and Networking 2010 2010:571407
  36. Camera systems are used in many applications including video surveillance for crime prevention and investigation, traffic monitoring on highways or building monitoring and automation. With the shift from analo...

    Authors: Thomas Winkler and Bernhard Rinner
    Citation: EURASIP Journal on Wireless Communications and Networking 2010 2011:530354
  37. The training-based channel estimation (TBCE) scheme in multiple-input multiple-output (MIMO) frequency-selective Rician fading channels is investigated. We propose the new technique of shifted scaled least squ...

    Authors: Hamid Nooralizadeh and Shahriar Shirvani Moghaddam
    Citation: EURASIP Journal on Wireless Communications and Networking 2010 2010:753637
  38. Increasing amount of Wireless Sensor Network (WSN) applications require low network delays. However, current research on WSNs has mainly concentrated on optimizing energy-efficiency omitting low network delays...

    Authors: Ville Kaseva, Timo D. Hämäläinen and Marko Hännikäinen
    Citation: EURASIP Journal on Wireless Communications and Networking 2010 2011:920141
  39. In Wireless Sensor Networks (WSNs), a robust and energy-efficient Medium Access Control (MAC) protocol is required for high energy efficiency in harsh operating conditions, where node and link failures are com...

    Authors: Mikko Kohvakka, Jukka Suhonen, Timo D. Hämäläinen and Marko Hännikäinen
    Citation: EURASIP Journal on Wireless Communications and Networking 2010 2010:878412
  40. To determine the capacity of wireless multiple access networks, the interference among the wireless links must be accurately modeled. In this paper, we formalize the notion of the partial interference phenomenon ...

    Authors: Ka-Hung Hui, Wing Cheong Lau and Onching Yue
    Citation: EURASIP Journal on Wireless Communications and Networking 2010 2010:735083
  41. The recording and playback system (RPS) in video conference system needs to store mass of media data real-timely. Considering the security issue, media data should be encrypted before storing. Traditional full...

    Authors: Chen Xiao, Shiguo Lian, Lifeng Wang, Shilong Ma, Weifeng Lv and Ke Xu
    Citation: EURASIP Journal on Wireless Communications and Networking 2010 2010:371513
  42. A new model used to compute the outdoor to indoor signal strength emitted from an outdoor base station is presented. This model is based on the combination of 2 existing models: IRLA (Intelligent Ray Launching), ...

    Authors: Guillaume de la Roche, Paul Flipo, Zhihua Lai, Guillaume Villemaud, Jie Zhang and Jean-Marie Gorce
    Citation: EURASIP Journal on Wireless Communications and Networking 2010 2010:215352
  43. Active interference cancellation (AIC) is an effective technique to provide interference avoidance feature for an ultrawideband (UWB) OFDM transmitter. Partial transmit sequence-AIC (PTS-AIC), which was recent...

    Authors: Poramate Tarasak, Zhiwei Lin, Xiaoming Peng and Francois Chin
    Citation: EURASIP Journal on Wireless Communications and Networking 2010 2010:151057
  44. We consider a dynamic spectrum sharing system consisting of a primary user, whose licensed spectrum is allowed to be accessed by a secondary user as long as it does not violate the prescribed interference limi...

    Authors: A. Shadmand, K. Nehra and M. Shikh-Bahaei
    Citation: EURASIP Journal on Wireless Communications and Networking 2010 2010:458472
  45. Through-wall tracking of moving targets is of great interest for rescue, surveillance, and security operations. For its realization, the handheld ultrawideband radars with small antenna array provide a practic...

    Authors: Jana Rovňáková and Dušan Kocur
    Citation: EURASIP Journal on Wireless Communications and Networking 2010 2010:420767
  46. A received signal strength- (RSS-)based indoor location method (ILS) for person/assets location in indoor scenarios is presented in this paper. Theoretical bases of the method are the integral equations relati...

    Authors: Yuri Álvarez, MaríaElena de Cos, José Lorenzo and Fernando Las-Heras
    Citation: EURASIP Journal on Wireless Communications and Networking 2010 2010:254345
  47. Convergence environments and technologies are urgently coming close to our life with various wireless communications and smart devices in order to provide many benefits such as connectivity, usability, mobilit...

    Authors: Taeshik Shon, Kyusuk Han, James J. (Jong hyuk) Park, Young-Sik Jeong and Yang Sun Lee
    Citation: EURASIP Journal on Wireless Communications and Networking 2010 2011:176393
  48. This work addresses the limits on the information that can be transmitted over the wireless channel under the conditions stated by the MAC layer: a selected scheduling discipline and an ensured level of QoS. B...

    Authors: Beatriz Soret, MCarmen Aguayo Torres and JTomás Entrambasaguas
    Citation: EURASIP Journal on Wireless Communications and Networking 2010 2010:726750

Who reads the journal?

Learn more about the impact the EURASIP Journal on Wireless Communications and Networking has worldwide

Annual Journal Metrics

  • 2022 Citation Impact
    2.6 - 2-year Impact Factor
    2.5 - 5-year Impact Factor
    1.098 - SNIP (Source Normalized Impact per Paper)
    0.985 - SJR (SCImago Journal Rank)

    2023 Speed
    23 days submission to first editorial decision for all manuscripts (Median)
    157 days submission to accept (Median)

    2023 Usage 
    1,226,841 downloads
    99 Altmetric mentions 

Funding your APC

​​​​​​​Open access funding and policy support by SpringerOpen​​

​​​​We offer a free open access support service to make it easier for you to discover and apply for article-processing charge (APC) funding. Learn more here