Zobrazeno 1 - 10
of 22
pro vyhledávání: '"Jihyuk Choi"'
Autor:
Byung-Su Kim, Tae-Gong Ryu, Jihyuk Choi, Tae Jun Park, Hankwon Chang, JeongHyun Yoo, Chang-Youl Suh, Sung-Wook Cho, Kimin Roh
Publikováno v:
Geosystem Engineering. 25:202-207
Publikováno v:
DESALINATION AND WATER TREATMENT. 97:1-7
Publikováno v:
DESALINATION AND WATER TREATMENT. 77:30-38
Publikováno v:
IEEE Transactions on Wireless Communications. 11:584-591
Substantial effort has been invested on secure location verification in hope to enable mobile wireless systems to optimize system performance or securely confer rights based on the participants' locations. However, most previous studies do not addres
Publikováno v:
Ad Hoc Networks. 9:16-27
We investigate the problem of maximizing Medium Access Control (MAC) throughput in Carrier Sense Multiple Access (CSMA) wireless networks. By explicitly incorporating the carrier sense threshold and the transmit power into our analysis, we derive an
Publikováno v:
Desalination & Water Treatment; Nov2017, Vol. 97, p1-7, 7p
Publikováno v:
ICC
Wireless access points largely fall into three categories: home and small business networks, enterprise networks, and hotspots. Wi-Fi Protected Access (WPA) provides solutions to home, small business, and enterprise networks, but hotspots typically a
Publikováno v:
ICC
In this paper, we propose a new soft-input soft-output (SISO) multi-input multi-output (MIMO) detection technique, called an improved SISO M-algorithm (ISS-MA). We modify the conventional M-algorithm to improve the performance-complexity trade-off of
Publikováno v:
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering ISBN: 9783642161605
SecureComm
SecureComm
We present a new denial-of-service attack against 802.11 wireless networks. Our attack exploits previously discovered performance degradation in networks with substantial rate diversity. In our attack, the attacker artificially reduces his link quali
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::5401d11244b7eb46ad09a39a3a03e716
https://doi.org/10.1007/978-3-642-16161-2_14
https://doi.org/10.1007/978-3-642-16161-2_14
Publikováno v:
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering ISBN: 9783642106248
QSHINE
QSHINE
The behavior of selfish users, which does not respect the backoff procedure of IEEE 802.11 WLAN, has been nicely studied in game-theoretic frameworks. However, in these studies, the effect of physical carrier sense has not been properly incorporated
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::446faa7e29208cfb6940108522b09c41
https://doi.org/10.1007/978-3-642-10625-5_22
https://doi.org/10.1007/978-3-642-10625-5_22