Skip to main content

Articles

Page 83 of 86

  1. This paper focuses on WPA and IEEE 802.11i protocols that represent two important solutions in the wireless environment. Scenarios where it is possible to produce a DoS attack and DoS flooding attacks are outline...

    Authors: Floriano De Rango, Dionigi Cristian Lentini and Salvatore Marano
    Citation: EURASIP Journal on Wireless Communications and Networking 2006 2006:047453
  2. Sensor networks have many applications. However, with limited resources such as computation capability and memory, they are vulnerable to many kinds of attacks. The IEEE 802.15.4 specification defines medium a...

    Authors: Yang Xiao, Hsiao-Hwa Chen, Bo Sun, Ruhai Wang and Sakshi Sethi
    Citation: EURASIP Journal on Wireless Communications and Networking 2006 2006:093830
  3. This paper presents circuit techniques and power supply partitioning, filtering, and regulation methods aimed at reducing the phase noise and spurious tones in frequency synthesizers operating in large mixed a...

    Authors: Adrian Maxim
    Citation: EURASIP Journal on Wireless Communications and Networking 2006 2006:024853
  4. Currently, together with the development of wireless connectivity, the need for a reliable and user-friendly authentication system becomes always more important. New applications, as e-commerce or home banking...

    Authors: G. Ginesu, D. D. Giusto and T. Onali
    Citation: EURASIP Journal on Wireless Communications and Networking 2006 2006:073685
  5. Infrastructure-based wireless LAN technology has been widely used in today's personal communication environment. Power efficiency and battery management have been the center of attention in the design of handh...

    Authors: Ye Ming Hua, Lau Chiew Tong and Benjamin Premkumar
    Citation: EURASIP Journal on Wireless Communications and Networking 2006 2006:063728
  6. Ranging with energy detectors enables low-cost implementation. However, any interference can be quite detrimental to range accuracy. We develop a method that performs nonlinear filtering on the received signal...

    Authors: Zafer Sahinoglu and Ismail Guvenc
    Citation: EURASIP Journal on Wireless Communications and Networking 2006 2006:056849
  7. To minimize QoS degradations during nonstationary packet loadings, predictive rate schedulers adapt the operation according to anticipated packet arrival rates deduced via specified estimation algorithm. Exist...

    Authors: Oliver Yu, Emir Saric and Anfei Li
    Citation: EURASIP Journal on Wireless Communications and Networking 2006 2006:043759
  8. A multiple-input multiple-output (MIMO) relay network comprises source, relay, and destination nodes, each of which is equipped with multiple antennas. In a previous work, we proposed a MIMO relay scheme for a...

    Authors: Tetsushi Abe, Hui Shi, Takahiro Asai and Hitoshi Yoshino
    Citation: EURASIP Journal on Wireless Communications and Networking 2006 2006:064159
  9. Broadcast and multicast offer a significant improvement of spectrum utilization, and become particularly important where information channels are shared among several users. Mobile cellular environments are ex...

    Authors: Nuno Souto, Armando Soares, Patricia Eusébio, Américo Correia and João C Silva
    Citation: EURASIP Journal on Wireless Communications and Networking 2006 2006:070903
  10. This paper analyzes the authentication and key agreement (AKA) protocol for universal mobile telecommunications system (UMTS) mobile networks, where a new protocol is proposed. In our proposed protocol, the mo...

    Authors: Ja'afer Al-Saraireh and Sufian Yousef
    Citation: EURASIP Journal on Wireless Communications and Networking 2006 2006:098107
  11. We propose a feedback algorithm for wireless networks that always collects feedback from the user with the best channel conditions and has a significant reduction in feedback load compared to full feedback. Th...

    Authors: Vegard Hassel, Mohamed-Slim Alouini, Geir E Øien and David Gesbert
    Citation: EURASIP Journal on Wireless Communications and Networking 2006 2006:036424
  12. As more broadband wireless standards are introduced and ratified, the complexity of wireless communication systems increases, which necessitates extra care and vigilance in their design. In this paper, various...

    Authors: Pedram Sameni, Chris Siu, Shahriar Mirabbasi, Hormoz Djahanshahi, Marwa Hamour, Krzysztof Iniewski and Jatinder Chana
    Citation: EURASIP Journal on Wireless Communications and Networking 2006 2006:093712
  13. We propose to combine the gains of a downlink power control and a joint multicode detection, for an HSDPA link. We propose an iterative algorithm that controls both the transmitted code powers and the joint mu...

    Authors: Bessem Sayadi, Stefan Ataman and Inbar Fijalkow
    Citation: EURASIP Journal on Wireless Communications and Networking 2006 2006:079148
  14. This paper addresses cross-layer quality-of-service (QoS) provisioning in the uplink of CDMA cellular mobile networks. Each mobile can take up to four UMTS traffic classes in our model. At the data link layer ...

    Authors: Chun Nie, Yong Huat Chew and David Tung Chong Wong
    Citation: EURASIP Journal on Wireless Communications and Networking 2006 2006:062657
  15. Many trust establishment solutions in mobile ad hoc networks (MANETs) rely on public key certificates. Therefore, they should be accompanied by an efficient mechanism for certificate revocation and validation....

    Authors: Giannis F Marias, Konstantinos Papapanagiotou, Vassileios Tsetsos, Odysseas Sekkas and Panagiotis Georgiadis
    Citation: EURASIP Journal on Wireless Communications and Networking 2006 2006:078259
  16. A cellular CDMA network with voice and data communications is considered. Focusing on the downlink direction, we seek for the overall performance improvement which can be achieved by cross-layer analysis and d...

    Authors: Jin Yuan Sun, Lian Zhao and Alagan Anpalagan
    Citation: EURASIP Journal on Wireless Communications and Networking 2006 2006:021297
  17. Multiple-input multiple-output (MIMO) and orthogonal frequency division multiplexing (OFDM) are very promising techniques to exploit spatial diversity and frequency diversity in the physical layer of broadband...

    Authors: Dandan Wang and Uf Tureli
    Citation: EURASIP Journal on Wireless Communications and Networking 2006 2006:060585
  18. Multicasting is an efficient method for transmission and routing of packets to multiple destinations using fewer network resources. Along with widespread deployment of wireless networks, secure multicast over ...

    Authors: Win Aye and Mohammad Umar Siddiqi
    Citation: EURASIP Journal on Wireless Communications and Networking 2006 2006:061769
  19. Future wireless networks must be able to coordinate services within a diverse-network environment. One of the challenging problems for coordination is vertical handoff, which is the decision for a mobile node ...

    Authors: Fang Zhu and Janise McNair
    Citation: EURASIP Journal on Wireless Communications and Networking 2006 2006:025861
  20. We exploit the interlayer coupling of a cross-layer design concept for streaming video delivery in a multiuser wireless environment. We propose a cross-layer optimization between application layer, data link l...

    Authors: Lai-U Choi, Wolfgang Kellerer and Eckehard Steinbach
    Citation: EURASIP Journal on Wireless Communications and Networking 2006 2006:060349
  21. We present an efficient method for supporting wireless video multicast services. One of the main goals of wireless video multicast services is to provide priority including dedicated bandwidth, controlled jitt...

    Authors: Kostas E Psannis and Yutaka Ishibashi
    Citation: EURASIP Journal on Wireless Communications and Networking 2006 2006:024616
  22. We investigate the cooperation efficiency of the multiple-relay channel when carrier-level synchronization is not available and all nodes use a decode-forward scheme. We show that by using decode-forward relay...

    Authors: Zigui Yang and Anders Høst-Madsen
    Citation: EURASIP Journal on Wireless Communications and Networking 2006 2006:056914
  23. Because of the random nature of user mobility, the channel gain of each user in a cellular network changes over time causing the signal-to-interference ratio (SNR) of the user to fluctuate continuously. Ongoin...

    Authors: Ki-Dong Lee and Victor C. M. Leung
    Citation: EURASIP Journal on Wireless Communications and Networking 2006 2006:075820
  24. We propose an energy aware on-demand routing protocol for CDMA mobile ad hoc networks, for which improvements in the energy consumption are realized by both introducing an energy-based routing measure and by e...

    Authors: Nie Nie and Cristina Comaniciu
    Citation: EURASIP Journal on Wireless Communications and Networking 2006 2006:076709
  25. We present a discrete-time second-order multibit sigma-delta ADC that filters and decimates by two the input data samples. At the same time it provides gain control function in its input sampling stage. A 4-ta...

    Authors: Jinseok Koh, Gabriel Gomez, Khurram Muhammad, R. Bogdan Staszewski and Baher Haroun
    Citation: EURASIP Journal on Wireless Communications and Networking 2006 2006:071249
  26. Two ultra-wideband (UWB) specifications, that is, direct-sequence (DS) UWB and multiband-orthogonal frequency division multiplexing (MB-OFDM) UWB, have been proposed as the candidates of the IEEE 802.15.3a, co...

    Authors: Yongjing Zhang, Haitao Wu, Qian Zhang and Ping Zhang
    Citation: EURASIP Journal on Wireless Communications and Networking 2006 2006:040380
  27. This paper presents multiple-channel SSL (MC-SSL), an architecture and protocol for protecting client-server communications. In contrast to SSL, which provides a single end-to-end secure channel, MC-SSL enable...

    Authors: Yong Song, Konstantin Beznosov and Victor C. M. Leung
    Citation: EURASIP Journal on Wireless Communications and Networking 2006 2006:085495
  28. The end-to-end performance of dual-hop cooperative diversity systems equipped with nonregenerative relays and a selection combining receiver at the destination terminal over independent and nonidentical Nakagami-

    Authors: Theodoros A Tsiftsis, George K Karagiannidis, P Takis Mathiopoulos and Stavros A Kotsopoulos
    Citation: EURASIP Journal on Wireless Communications and Networking 2006 2006:017862
  29. The problem of choosing the optimal multipath components to be employed at a minimum mean square error (MMSE) selective Rake receiver is considered for an impulse radio ultra-wideband system. First, the optima...

    Authors: Sinan Gezici, Mung Chiang, H. Vincent Poor and Hisashi Kobayashi
    Citation: EURASIP Journal on Wireless Communications and Networking 2006 2006:084249
  30. A cluster-based cooperative multiple-input-multiple-output (MIMO) scheme is proposed to reduce the adverse impacts caused by radio irregularity and fading in multi-hop wireless sensor networks. This scheme ext...

    Authors: Yong Yuan, Min Chen and Taekyoung Kwon
    Citation: EURASIP Journal on Wireless Communications and Networking 2006 2006:072493
  31. The possible role of customized MOS varactors in amplification, mixing, and frequency control of future millimeter wave CMOS RFICs is outlined. First, the parametric conversion concept is revisited and discuss...

    Authors: Howard Chan, Zhongbo Chen, Sebastian Magierowski and Krzysztof (Kris) Iniewski
    Citation: EURASIP Journal on Wireless Communications and Networking 2006 2006:012945
  32. In order to mitigate high cochannel interference resulting from dense channel reuse, the interference management issues are often considered as essential part of scheduling schemes in fixed broadband wireless acc...

    Authors: Mahmudur Rahman, Halim Yanikomeroglu, Mohamed H Ahmed and Samy Mahmoud
    Citation: EURASIP Journal on Wireless Communications and Networking 2006 2006:080493
  33. Denial of service (DoS) attack is a major class of security threats today. They consume resources of remote hosts or network and make them deny or degrade services for legitimate users. Compared with tradition...

    Authors: Xin Jin, Yaoxue Zhang, Yi Pan and Yuezhi Zhou
    Citation: EURASIP Journal on Wireless Communications and Networking 2006 2006:096157
  34. In a TDMA standard such as DECT, low bit-rate transmission is feasible either at the cost of efficiency (shorter slots with fixed overhead per slot) or increased latency (longer frames). This paper proposes a ...

    Authors: Rohit Budhiraja and Bhaskar Ramamurthi
    Citation: EURASIP Journal on Wireless Communications and Networking 2006 2006:054148
  35. A MEMS capacitive switch suitable for use in tunable RF amplifiers is described. A MEMS switch is designed, fabricated, and characterized with physical and RF measurements for inclusion in simulations. Using t...

    Authors: John Danson, Calvin Plett and Niall Tait
    Citation: EURASIP Journal on Wireless Communications and Networking 2006 2006:016518
  36. Recent research has indicated that transmission control protocol (TCP) in its base form does not perform well in an ad hoc environment. The main reason identified for this behavior involves the ad hoc network ...

    Authors: Nagaraja Thanthry, Anand Kalamkar and Ravi Pendse
    Citation: EURASIP Journal on Wireless Communications and Networking 2006 2006:095149
  37. Multimedia telephony is a delay-sensitive application. Packet losses, relatively less critical than delay, are allowed up to a certain threshold. They represent the QoS constraints that have to be respected to...

    Authors: Valeria Loscri', Mauro Tropea and Salvatore Marano
    Citation: EURASIP Journal on Wireless Communications and Networking 2006 2006:084945
  38. This paper examines error control coding (ECC) use in wireless sensor networks (WSNs) to determine the energy efficiency of specific ECC implementations in WSNs. ECC provides coding gain, resulting in transmit...

    Authors: Sheryl L. Howard, Christian Schlegel, Kris Iniewski and Kris Iniewski
    Citation: EURASIP Journal on Wireless Communications and Networking 2006 2006:074812
  39. We study the problem of maximizing the minimum signal-to-interference ratio (SIR) in a multiuser system with an adaptive receive strategy. The interference of each user is modelled by an axiomatic framework, w...

    Authors: Holger Boche and Martin Schubert
    Citation: EURASIP Journal on Wireless Communications and Networking 2006 2006:060681
  40. A new algorithm to estimate amplitude, delay, phase, and frequency offset of a received signal is presented. The frequency-offset estimation is performed by maximizing, with respect to the conjugate cycle freq...

    Authors: Valentina De Angelis, Luciano Izzo, Antonio Napolitano and Mario Tanda
    Citation: EURASIP Journal on Wireless Communications and Networking 2006 2006:086026
  41. Ultra-wideband (UWB) is an emerging broadband wireless technology enabling data rates up to http://static-content.springer.com/image/art%3A10.1155%2FWCN%2F2006%2F43917/MediaObjects/13638_2005_Article_1234_IEq1_HTML.gif Mbps. This paper provides an overview of recent desi...

    Authors: D. M. W. Leenaerts
    Citation: EURASIP Journal on Wireless Communications and Networking 2006 2006:043917
  42. This paper presents a detailed performance analysis of adaptive downlink resource allocation based on users' instantaneous channel responses using power minimization (PM) and bandwidth constrained power minimi...

    Authors: Navid Damji and Tho Le-Ngoc
    Citation: EURASIP Journal on Wireless Communications and Networking 2006 2006:017526
  43. Sparse intersymbol-interference (ISI) channels are encountered in a variety of communication systems, especially in high-data-rate systems. These channels have a large memory length, but only a small number of...

    Authors: Jan Mietzner, Sabah Badri-Hoeher, Ingmar Land and Peter A Hoeher
    Citation: EURASIP Journal on Wireless Communications and Networking 2006 2006:029075
  44. This paper deals with finding the maximum number of security policies without conflicts. By doing so we can remove security loophole that causes security violation. We present the problem of maximum compatible...

    Authors: Scott C-H Huang, Kia Makki and Niki Pissinou
    Citation: EURASIP Journal on Wireless Communications and Networking 2006 2006:023728
  45. This paper offers a review of simulation methods currently available for the transient and steady-state analysis of nonlinear RF and microwave circuits. The most general method continues to be the time-marchin...

    Authors: Lei (Lana) Zhu and Carlos E Christoffersen
    Citation: EURASIP Journal on Wireless Communications and Networking 2006 2006:032097
  46. In this paper, we propose SeGrid, a secure framework for establishing grid keys in low duty cycle sensor networks, for which establishing a common key for each pair of neighboring sensors is unnecessary since ...

    Authors: Xiuzhen Cheng, Fang Liu and Fengguang An
    Citation: EURASIP Journal on Wireless Communications and Networking 2006 2006:090652

Who reads the journal?

Learn more about the impact the EURASIP Journal on Wireless Communications and Networking has worldwide

Annual Journal Metrics

  • 2022 Citation Impact
    2.6 - 2-year Impact Factor
    2.5 - 5-year Impact Factor
    1.098 - SNIP (Source Normalized Impact per Paper)
    0.985 - SJR (SCImago Journal Rank)

    2023 Speed
    23 days submission to first editorial decision for all manuscripts (Median)
    157 days submission to accept (Median)

    2023 Usage 
    1,226,841 downloads
    99 Altmetric mentions 

Funding your APC

​​​​​​​Open access funding and policy support by SpringerOpen​​

​​​​We offer a free open access support service to make it easier for you to discover and apply for article-processing charge (APC) funding. Learn more here