IEEE Access

Results: 1545



#Item
121Wireless networking / Wi-Fi / Wireless access point / IEEE 802.11 / 5G / Wireless / Anechoic chamber / Wi-Fi Alliance

KYRIO Wireless TESTING Wi-Fi engineering, testing and modeling for optimal performance, industry certification and quality assurance.

Add to Reading List

Source URL: 3t6txd2a7b6wozmeg1p1gqd1.wpengine.netdna-cdn.com

Language: English - Date: 2016-03-31 16:26:25
122

New Enhancement: Roaming Access for IP authenticated subscribers With this release, IP authenticated customers will now be able to offer roaming access their users so they can access IEEE Xplore off-site. This feature wi

Add to Reading List

Source URL: www.cnudst.rnrt.tn

Language: English - Date: 2015-04-01 05:32:45
    123

    Special Section: Call for Papers Announcing a Special Section in IEEE Access: Emergent Topics for Mobile and Ubiquitous Systems in Smartphone, IoT, and Cloud Computing Era Submission Deadline: February 10, 2017

    Add to Reading List

    Source URL: mobiquitous.org

    Language: English - Date: 2016-04-07 23:21:39
      124Humancomputer interaction / Software / Computer mice / User interface techniques / Computer mouse / Pointing device / Eye tracking / Pointer / Cursor / Assistive technology / Mouse button / Webcam

      IEEE TRANSACTIONS ON NEURAL SYSTEMS AND REHABILITATION ENGINEERING, VOL 10, NO 1, MARCHThe Camera Mouse: Visual Tracking of Body Features to Provide Computer Access for People

      Add to Reading List

      Source URL: cameramouse.org

      Language: English - Date: 2013-10-22 13:21:29
      125Computing / Computer architecture / Computer network security / Wireless networking / IEEE 802.11 / Local area networks / Cryptographic protocols / Wireless / Wi-Fi Protected Access / Protected Extensible Authentication Protocol / Ubuntu / Cracking of wireless networks

      Connecting to the Rovernet WPA2 Secured Wireless Network with with UbuntuIntreped Ibex) Configuring your wireless device to use WPA2 takes a few minutes. You will, however, need to meet the following system requir

      Add to Reading List

      Source URL: www.it.mtu.edu

      Language: English - Date: 2015-09-21 08:47:24
      126Wireless networking / Wi-Fi / Wireless LAN / Wireless access point / Wireless security / IEEE 802.11 / Wireless network / WLAN / Telemetry / 5G / Wireless / LTE-WLAN Aggregation

      BEST PRACTICES Building a Reliable Wireless Medical Device Network David Hoglund and Vince Varga

      Add to Reading List

      Source URL: www.gtri.com

      Language: English - Date: 2014-09-02 15:27:00
      127Computer network security / Cryptographic protocols / Wi-Fi / IEEE 802.11 / Wireless networking / Wi-Fi Protected Access / IEEE 802.1X / IEEE 802.11i-2004 / AirPort / Wireless security / Cracking of wireless networks

      Connecting to the Rovernet WPA2 Secured Wireless Network with the Mac OS XTiger) Configuring your wireless device to use WPA2 takes a few minutes. You will, however, need to meet the following system requirements

      Add to Reading List

      Source URL: www.it.mtu.edu

      Language: English - Date: 2015-09-21 08:47:24
      128Radio resource management / Signal processing / Information theory / IEEE 802 / Telecommunications engineering / Radio electronics / Electrical engineering / MIMO / Antenna / Precoding / IEEE 802.11n-2009 / Carrier frequency offset

      Random Access Heterogeneous MIMO Networks Kate Ching-Ju Lin Shyamnath Gollakota Dina Katabi

      Add to Reading List

      Source URL: nms.citi.sinica.edu.tw

      Language: English - Date: 2013-02-26 21:17:08
      129Computing / Computer network security / Wireless networking / IEEE 802.11 / Wireless / Local area networks / Wi-Fi / Wi-Fi Protected Access / Protected Extensible Authentication Protocol / IEEE 802.1X / Windows XP / Wireless security

      Connecting to the Rovernet WPA2 Secured Wireless Network with Windows XP Configuring your wireless device to use WPA2 takes a few minutes. You will, however, need to meet the following system requirements in order to con

      Add to Reading List

      Source URL: www.it.mtu.edu

      Language: English - Date: 2015-09-21 08:47:24
      130Data transmission / Signal processing / Central limit theorem / Additive white Gaussian noise / Gaussian function / Phase-shift keying / Discrete Fourier transform / KarhunenLove theorem / Kalman filter

      Spread-Spectrum Multiple-Access Performance of Orthogonal Codes: Linear Receivers PER K. ENGE, MEMBER, IEEE, AND

      Add to Reading List

      Source URL: www.ifp.illinois.edu

      Language: English - Date: 2003-07-08 15:54:30
      UPDATE