Skip to main content

Articles

Page 72 of 86

  1. Authors: Yan Zhang, Thomas Michael Bohnert, Dmitri Moltchanov, Dirk Staehle, Gabor Fodor and Edward Knightly
    Citation: EURASIP Journal on Wireless Communications and Networking 2010 2009:620795
  2. Considering the energy constraint for fixed sensor nodes and the unacceptable long propagation delay, especially for latency sensitive applications of underwater acoustic sensor networks, we propose a MAC prot...

    Authors: Qingchun Ren and Xiuzhen Cheng
    Citation: EURASIP Journal on Wireless Communications and Networking 2010 2010:323151
  3. Wireless networking experimentation research has become highly popular due to both the frequent mismatch between theory and practice and the widespread availability of low-cost WLAN cards. However, current WLA...

    Authors: Marc Portoles-Comeras, Josep Mangues-Bafalluy and Manuel Requena-Esteso
    Citation: EURASIP Journal on Wireless Communications and Networking 2010 2010:527847
  4. Trust aware routing in Wireless Sensor Network (WSN) is an important direction in designing routing protocols for WSN that are susceptible to malicious attacks. The common approach to provide trust aware routi...

    Authors: Ismat Maarouf, Uthman Baroudi and A. R. Naseer
    Citation: EURASIP Journal on Wireless Communications and Networking 2010 2009:718318
  5. We present a blind coarse timing offset estimation technique for CP-OFDM and ZP-OFDM transmission over frequency selective channels. The technique exploits the cyclic prefix or zero-padding structure to estima...

    Authors: Vincent Le Nir, Toon van Waterschoot, Jonathan Duplicy and Marc Moonen
    Citation: EURASIP Journal on Wireless Communications and Networking 2010 2009:262813
  6. This paper introduces packet-oriented block codes for the recovery of lost packets and the correction of an erroneous single packet. Specifically, a family of systematic codes is proposed, based on a Vandermon...

    Authors: Ali Al-Shaikhi and Jacek Ilow
    Citation: EURASIP Journal on Wireless Communications and Networking 2010 2010:263210
  7. Wireless Underground Sensor Networks (WUSNs) constitute one of the promising application areas of the recently developed wireless sensor networking techniques. WUSN is a specialized kind of Wireless Sensor Net...

    Authors: Agnelo R. Silva and Mehmet C. Vuran
    Citation: EURASIP Journal on Wireless Communications and Networking 2010 2010:620307
  8. The development of state-of-the-art wireless communication transceivers in semiconductor technology is a challenging process due to complexity and stringent requirements of modern communication standards such ...

    Authors: Pierre Greisen, Simon Haene and Andreas Burg
    Citation: EURASIP Journal on Wireless Communications and Networking 2010 2010:196796
  9. From a networking perspective, the chief impediment to throughput enhancement in infrastructure networks such as IEEE802.11 is the access point bottleneck: all traffic to, through, and from the network has to ...

    Authors: Aaron Jow and Curt Schurgers
    Citation: EURASIP Journal on Wireless Communications and Networking 2010 2009:174730
  10. Physical layer security is an emerging security area that achieves perfect secrecy data transmission between intended network nodes, while malicious nodes that eavesdrop the communication obtain zero informati...

    Authors: Zhu Han, Ninoslav Marina, Mérouane Debbah and Are Hjørungnes
    Citation: EURASIP Journal on Wireless Communications and Networking 2010 2009:452907
  11. Wireless Mesh Networks represent an interesting instance of light-infrastructure wireless networks. Due to their flexibility and resiliency to network failures, wireless mesh networks are particularly suitable...

    Authors: Fabrizio Granelli, Roberto Riggio, Tinku Rasheed and Daniele Miorandi
    Citation: EURASIP Journal on Wireless Communications and Networking 2010 2010:730198
  12. Flexbility and deployment simplicity are among the numerous advantages of wireless links when compared to standard wired communications. However, challenges do remain high for wireless communications, in parti...

    Authors: R Massin, C Lamy-Bergot, C. J. Le Martret and R. Fracchia
    Citation: EURASIP Journal on Wireless Communications and Networking 2010 2010:502549
  13. A lot of attention has been given to multihop wireless networks lately, but further research—in particular, through experimentation—is needed. This attention has motivated an increase in the number of 802.11-b...

    Authors: Pablo Serrano, Carlos J. Bernardos, Antonio de la Oliva, Albert Banchs, Ignacio Soto and Michael Zink
    Citation: EURASIP Journal on Wireless Communications and Networking 2010 2010:153102
  14. The performance of different modulation schemes of a broadband fixed wireless 802.16 (WiMAX) system in a sector is experimentally determined and compared to link budget calculations using different path loss m...

    Authors: Jeffrey De Bruyne, Wout Joseph, David Plets, Leen Verloock, Emmeric Tanghe and Luc Martens
    Citation: EURASIP Journal on Wireless Communications and Networking 2009 2009:247436
  15. Secret sharing over the fast-fading MIMO wiretap channel is considered. A source and a destination try to share secret information over a fast-fading MIMO channel in the presence of an eavesdropper who also ma...

    Authors: Tan F. Wong, Matthieu Bloch and John M. Shea
    Citation: EURASIP Journal on Wireless Communications and Networking 2009 2009:506973
  16. Authors: Yang Xiao, Hui Chen, Shuhui Yang, Yi-Bing Lin and Ding-Zhu Du
    Citation: EURASIP Journal on Wireless Communications and Networking 2009 2009:532434
  17. This paper addresses mobility control routing in wireless networks. Given a data flow request between a source-destination pair, the problem is to move nodes towards the best placement, such that the performan...

    Authors: Valeria Loscrí, Enrico Natalizio and Carmelo Costanzo
    Citation: EURASIP Journal on Wireless Communications and Networking 2009 2010:315381
  18. More and more applications and protocols are now running on wireless networks. Testing the implementation of such applications and protocols is a real challenge as the position of the mobile terminals and envi...

    Authors: Emmanuel Conchon, Tanguy Pérennou, Johan Garcia and Michel Diaz
    Citation: EURASIP Journal on Wireless Communications and Networking 2009 2010:149075
  19. Wireless Sensor Networks (WSNs) technology has been mainly used in the applications with low-frequency sampling and little computational complexity. Recently, new classes of WSN-based applications with differe...

    Authors: Paolo Pagano, Mangesh Chitnis, Giuseppe Lipari, Christian Nastasi and Yao Liang
    Citation: EURASIP Journal on Wireless Communications and Networking 2009 2010:107946
  20. Cooperative transmission is an emerging wireless communication technique that improves wireless channel capacity through multiuser cooperation in the physical layer. It is expected to have a profound impact on...

    Authors: Zhu Han and Yan Lindsay Sun
    Citation: EURASIP Journal on Wireless Communications and Networking 2009 2009:740912
  21. One of the great mysteries of the brain is cognitive control. How can the interactions between millions of neurons result in behavior that is coordinated and appears willful and voluntary? There is consensus t...

    Authors: Qilian Liang
    Citation: EURASIP Journal on Wireless Communications and Networking 2009 2010:523435
  22. The IEEE 802.21 framework for Media Independent Handover (MIH) provides seamless vertical handover support for multimode mobile terminals. MIH messages are exchanged over various wireless media between mobile ...

    Authors: Jeong-Jae Won, Murahari Vadapalli, Choong-Ho Cho and VictorCM Leung
    Citation: EURASIP Journal on Wireless Communications and Networking 2009 2009:716480
  23. Green Networking can be the way to help reduce carbon emissions by the Information and Communications Technology (ICT) Industry. This paper presents some of the major components of Green Networking and discuss...

    Authors: Naveen Chilamkurti, Sherali Zeadally and Frank Mentiplay
    Citation: EURASIP Journal on Wireless Communications and Networking 2009 2009:656785
  24. Information collection in the disaster area is an important application of pigeon networks—a special type of delay tolerant networks (DTNs) that borrows the ancient idea of using pigeons as the telecommunicati...

    Authors: Jiazhen Zhou, Jiang Li and Legand Burge
    Citation: EURASIP Journal on Wireless Communications and Networking 2009 2010:142921
  25. Achievable rates and resource allocation strategies for imperfectly known fading relay channels are studied. It is assumed that communication starts with the network training phase in which the receivers estim...

    Authors: Junwei Zhang and Mustafa Cenk Gursoy
    Citation: EURASIP Journal on Wireless Communications and Networking 2009 2009:458236
  26. The design, implementation, and test of a real-time flexible http://static-content.springer.com/image/art%3A10.1155%2F2010%2F871291/MediaObjects/13638_2009_Article_2049_IEq1_HTML.gif (Multiple Input Multiple Output-Orthogonal Frequency Division Multiplexing...

    Authors: Víctor P. Gil Jiménez, M. Julia Fernández-Getino García, Ana García Armada, Rafael P. Torres, Juan José García Fernández, Matilde P. Sánchez-Fernández, Marta Domingo and Oscar Fernández
    Citation: EURASIP Journal on Wireless Communications and Networking 2009 2010:871291
  27. Traffic safety applications on vehicular ad hoc networks (VANETs) have drawn a lot of attention in recent years with their promising functions on car accident reduction, real-time traffic information support, ...

    Authors: Nai-Wei Lo and Hsiao-Chien Tsai
    Citation: EURASIP Journal on Wireless Communications and Networking 2009 2009:125348
  28. Multihop wireless networks will play an important role in future communication networks. Beamforming antennas have shown great potential to improve the connectivity in these networks; however only heuristic ap...

    Authors: Moritz Kiese, Christian Hartmann, Julian Lamberty and Robert Vilzmann
    Citation: EURASIP Journal on Wireless Communications and Networking 2009 2009:878419
  29. The use of real-time delay-sensitive applications in wireless systems has significantly grown during the last years. Therefore the designers of wireless systems have faced a challenging issue to guarantee the ...

    Authors: Nizar Zorba and Christos Verikoukis
    Citation: EURASIP Journal on Wireless Communications and Networking 2009 2010:564527
  30. We consider a source-destination pair that can only communicate through an untrusted intermediate relay node. The intermediate node is willing to employ a designated relaying scheme to facilitate reliable communi...

    Authors: Xiang He and Aylin Yener
    Citation: EURASIP Journal on Wireless Communications and Networking 2009 2009:305146
  31. We propose the efficient reliable multicast MAC protocol based on the connectivity information among the recipients. Enhancing the BMMM (Batch Mode Multicast MAC) protocol, the reliable multicast MAC protocol ...

    Authors: Woo-Yong Choi
    Citation: EURASIP Journal on Wireless Communications and Networking 2009 2009:968408

    The Erratum to this article has been published in EURASIP Journal on Wireless Communications and Networking 2010 2010:439738

  32. In Wireless Sensor Network (WSN), the nodes have limitations in terms of energy-constraint, unreliable links, and frequent topology change. In this paper we propose an energy-aware routing protocol, that outpe...

    Authors: Noor M. Khan, Zubair Khalid and Ghufran Ahmed
    Citation: EURASIP Journal on Wireless Communications and Networking 2009 2009:275694
  33. The spectrum scarcity problem emerged in recent years, due to unbalanced utilization of RF (radio frequency) bands in the current state of wireless spectrum allocations. Spectrum access scheduling addresses ch...

    Authors: Lichun Bao and Shenghui Liao
    Citation: EURASIP Journal on Wireless Communications and Networking 2009 2010:736365
  34. We investigate the benefits of two-hop opportunistic relay in time division duplex (TDD) OFDMA cellular network configurations. The paper starts with a short analytical model for the two-hop opportunistic rela...

    Authors: George Calcev and Jeff Bonta
    Citation: EURASIP Journal on Wireless Communications and Networking 2009 2009:702659
  35. Current radio frequency power amplifiers in 3G base stations have very high power consumption leading to a hefty cost and negative environmental impact. In this paper, we propose a potential architecture desig...

    Authors: Vandana Bassoo, Kevin Tom, A. K. Mustafa, Ellie Cijvat, Henrik Sjoland and Mike Faulkner
    Citation: EURASIP Journal on Wireless Communications and Networking 2009 2009:821846
  36. We propose and compare three novel heuristics for the calculation of the optimal cell radius in mobile networks based on Wideband Code Division Multiple Access (WCDMA) technology. The proposed heuristics solve...

    Authors: A. Portilla-Figueras, S. Salcedo-Sanz, Klaus D. Hackbarth, F. López-Ferreras and G. Esteve-Asensio
    Citation: EURASIP Journal on Wireless Communications and Networking 2009 2009:314814
  37. Wormhole attacks can negatively affect the localization in wireless sensor networks. A typical wormhole attack can be launched by two colluding attackers, one of which sniffs packets at one point in the networ...

    Authors: Honglong Chen, Wei Lou, Xice Sun and Zhi Wang
    Citation: EURASIP Journal on Wireless Communications and Networking 2009 2010:627039
  38. Increasingly ubiquitous wireless technologies require novel localization techniques to pinpoint the position of an uncooperative node, whether the target is a malicious device engaging in a security exploit or...

    Authors: Christine Laurendeau and Michel Barbeau
    Citation: EURASIP Journal on Wireless Communications and Networking 2009 2010:567040
  39. In Mobile Ad Hoc Networks (MANETs), determining the physical location of nodes (localization) is very important for many network services and protocols. This paper proposes a new Distributed Range-Free Localiz...

    Authors: PhamDoan Tinh and Makoto Kawai
    Citation: EURASIP Journal on Wireless Communications and Networking 2009 2010:692513
  40. Source privacy plays a key role in communication infrastructure protection. It is a critical security requirement for many mission critical communications. This is especially true for mobile ad hoc networks (M...

    Authors: Jian Ren, Yun Li and Tongtong Li
    Citation: EURASIP Journal on Wireless Communications and Networking 2009 2010:534712
  41. We propose a network quality aware routing (NQAR) mechanism to provide an enabling method of the delay-sensitive data delivery over error-prone wireless sensor networks. Unlike the existing routing methods tha...

    Authors: Jaewon Choi, Baek-Young Choi, Sejun Song and Kwang-Hui Lee
    Citation: EURASIP Journal on Wireless Communications and Networking 2009 2010:409724
  42. This paper studies the capacity of hybrid wireless networks with opportunistic routing (OR). We first extend the opportunistic routing algorithm to exploit high-speed data transmissions in infrastructure netwo...

    Authors: Tan Le and Yong Liu
    Citation: EURASIP Journal on Wireless Communications and Networking 2009 2010:202197
  43. Intercarrier Interference (ICI) is an impairment well known to degrade performance of Orthogonal Frequency Division Multiplexing (OFDM) transmissions. It arises from carrier frequency offsets (CFOs), from the ...

    Authors: Martín García and Christian Oberli
    Citation: EURASIP Journal on Wireless Communications and Networking 2009 2009:786040
  44. One of the key factors for the successful deployment of mobile satellite systems in 4G networks is the maximization of the technology commonalities with the terrestrial systems. An effective way of achieving t...

    Authors: Francesco Bastia, Cecilia Bersani, Enzo Alberto Candreva, Stefano Cioni, Giovanni Emanuele Corazza, Massimo Neri, Claudio Palestini, Marco Papaleo, Stefano Rosati and Alessandro Vanelli-Coralli
    Citation: EURASIP Journal on Wireless Communications and Networking 2009 2009:989062
  45. We present a design of a complete and practical scheduler for the 3GPP Long Term Evolution (LTE) downlink by integrating recent results on resource allocation, fast computational algorithms, and scheduling. Ou...

    Authors: Bilal Sadiq, Ritesh Madan and Ashwin Sampath
    Citation: EURASIP Journal on Wireless Communications and Networking 2009 2009:510617
  46. Wireless sensors rely on battery power, and in many applications it is difficult or prohibitive to replace them. Hence, in order to prolongate the system's lifetime, some sensors can be kept inactive while oth...

    Authors: Giordano Fusco and Himanshu Gupta
    Citation: EURASIP Journal on Wireless Communications and Networking 2009 2010:192752
  47. Public safety organizations increasingly rely on wireless technology to provide effective communications during emergency and disaster response operations. This paper presents a comprehensive study on dynamic ...

    Authors: Wenxuan Guo and Xinming Huang
    Citation: EURASIP Journal on Wireless Communications and Networking 2009 2009:251314

Who reads the journal?

Learn more about the impact the EURASIP Journal on Wireless Communications and Networking has worldwide

Annual Journal Metrics

  • 2022 Citation Impact
    2.6 - 2-year Impact Factor
    2.5 - 5-year Impact Factor
    1.098 - SNIP (Source Normalized Impact per Paper)
    0.985 - SJR (SCImago Journal Rank)

    2023 Speed
    23 days submission to first editorial decision for all manuscripts (Median)
    157 days submission to accept (Median)

    2023 Usage 
    1,226,841 downloads
    99 Altmetric mentions 

Funding your APC

​​​​​​​Open access funding and policy support by SpringerOpen​​

​​​​We offer a free open access support service to make it easier for you to discover and apply for article-processing charge (APC) funding. Learn more here