Search

Showing total 9 results
9 results

Search Results

1. Application of a secure data transmission with an effective timing algorithm based on LoRa modulation and chaos.

2. Optimal bidding strategy for generation companies under CVaR constraint.

3. A formal modeling and analysis approach for access control rules, policies, and their combinations.

4. Feedback-assisted MAC protocol for real time traffic in high rate wireless personal area networks.

5. Random-Access Control Mechanisms Using Adaptive Traffic Load in ALOHA and CSMA Strategies for EDGE.

6. Design of a block time bounded TDMA (BTB-TDMA) MAC protocol for UANets

7. Dynamically optimized spatiotemporal prioritization for spectrum sensing in cooperative cognitive radio.

8. Delay-guaranteed Energy Saving Algorithm for the Delay-sensitive Applications in IEEE 802.16e Systems.

9. Performance evaluation of media access control protocols using an algorithm generating graphs for effect estimation of hidden terminals.