WCNC 2007: Hong Kong, China

Refine list

showing all ?? records

Cognitive Radio 1

Cognitive Radio 2

Ad hoc Networks 1

Turbo Codes

Cognitive Radio 3

Ad hoc Networks 2

Channel Estimation 1

CDMA

Channel Estimation 2

Ad hoc Networks 3

Cross-layer Design 1

Cross-layer Design 2

MAC Protocols 1

MAC Protocols 2

Cross-layer Design 3

MAC Protocols 3

MAC Protocols 4

MAC Protocols 5

Transceiver Design

Equalization

Modulation and Coding 1

Space-Time Coding 1

LDPC Applications 1

Space-Time Coding 2

Multi-carrier

Modulation and Coding 2

LDPC Applications 2

Modulation and Coding 3

Modulation and Coding 4

Space-Time Coding 3

Cooperative Networks 1

Cooperative Networks 2

MIMO-OFDM 1

MIMO-OFDM 2

Cooperative Networks 3

Multiuser detection and interference cancellation 1

MIMO-OFDM 3

Cooperative Networks 4

Multiuser detection and interference cancellation 2

Synchronization 3

MIMO 1

MIMO 2

MIMO 3

MIMO 4

MIMO 5

Synchronization 1

MIMO 6

Detection and Estimation

MIMO 7

MIMO 8

OFDM 1

OFDM 2

OFDM 3

OFDM 4

OFDM 5

OFDM 6

Frequency Domain Equalization

OFDM 7

Scheduling 1

Scheduling 2

UWB 1

UWB 2

UWB 3

UWB 4

RFID

Resource Allocation and Management 1

Resource Allocation and Management 2

UWB 5

Resource Allocation and Management 3

Diversity 3

WiMAX 1

WiMAX 2

WiMAX 3

Channel Characterization and Modeling 1

Diversity 1

WiMAX 4

Synchronization 2

Diversity 2

Channel Characterization and Modeling 2

Channel Characterization and Modeling 3

Wireless LANs 1

Wireless LANs 2

Wireless LANs 3

Wireless LANs 4

Phy/MAC Poster Session 1

Phy/MAC Poster Session 2

Phy/MAC Poster Session 3

Phy/MAC Poster Session 4

Wireless Sensor Networks 2

Mobile Systems

Intelligent Systems

Wireless/Ad-Hoc Network Applications

QoS

Security II

Wireless Sensor Netwoks I

Wireless Multimedia

Wireless LANs

Security I

Applications

Wireless Access

Wireless Sensor Networks 3

Wireless Protocols

Ad-Hoc Networks

Wireless Sensor Networks 4

Services and Applications Posters 1

Services and Applications Posters Session 2

Services and Applications Posters Session 3

Services and Applications Posters Session 4

Routing in multihop - 1

Wireless network security and privacy - 1

Performance of end-to-end protocols over wireless networks - 1

Ad hoc and sensor networks - 2

Congestion and admission control - 2

Mobility - 3

Multimedia QoS and traffic management - 3

Wireless network security and privacy - 4

Cooperative networks - 4

Mobility - 5

Mobility - 1

Multimedia QoS and traffic management - 1

Simulation-Based Comparisons of Solutions

Location and handoff management - 2

Interworking heterogeneous wireless/wireline networks - 2

Wireless multicasting - 3

Cooperative networks - 3

Routing in multihop - 4

Congestion and admission control - 4

Ad hoc and sensor networks - 6

Cooperative networks - 1

Wireless multicasting - 1

Routing in multihop - 2

Wireless network security and privacy - 2

Performance of end-to-end protocols over wireless networks - 2

Ad hoc and sensor networks - 3

Congestion and admission control - 3

Mobility - 4

Multimedia QoS and traffic management - 4

Congestion and admission control - 5

Ad hoc and sensor networks - 1

Congestion and admission control - 1

Mobility - 2

Multimedia QoS and traffic management - 2

Mobile and wireless IP - 2

Location and handoff management - 3

Interworking heterogeneous wireless/wireline networks - 3

Location and handoff management - 4

Routing in multihop - 5

Routing in multihop - 6

Location and handoff management - 1

Interworking heterogeneous wireless/wireline networks - 1

Wireless multicasting - 2

Cooperative networks - 2

Routing in multihop - 3

Wireless network security and privacy - 3

Performance of end-to-end protocols over wireless networks - 3

Ad hoc and sensor networks - 4

Ad hoc and sensor networks - 5

Multimedia QoS and traffic management - 5

Networking Program Posters Session - 1

Networking Program Posters Session - 2

Networking Program Posters Session - 3

Networking Program Poster Session - 4

a service of  Schloss Dagstuhl - Leibniz Center for Informatics