Sciweavers

LCN
2006
IEEE
13 years 10 months ago
On Access Point Selection in IEEE 802.11 Wireless Local Area Networks
In wireless local area networks often a station can potentially associate with more than one access point. Therefore, a relevant question is which access point to select “best...
Murad Abusubaih, James Gross, Sven Wiethölter...
ICDCS
2006
IEEE
13 years 10 months ago
On the Access Pricing Issues of Wireless Mesh Networks
This paper studies the use of pricing as an incentive mechanism to encourage private, self-interested nodes to participate in a public wireless mesh network and cooperate in the p...
Ray K. Lam, John C. S. Lui, Dah-Ming Chiu
GLOBECOM
2006
IEEE
13 years 10 months ago
A Distributed Opportunistic Access Scheme for OFDMA Systems
Abstract— In this paper, we propose a distributed opportunistic access scheme for uplink OFDMA systems. The sub-carriers are grouped into several sub-channels. Users access these...
Dandan Wang, Hlaing Minn, Naofal Al-Dhahir
LOCA
2007
Springer
13 years 10 months ago
Bootstrapping a Location Service Through Geocoded Postal Addresses
We analyze the feasibility of boostrapping a location service through geocoded postal addresses rather than the common wardriving technique. A location service that contains the MA...
Gayathri Chandrasekaran, Mesut Ali Ergin, Marco Gr...
INFOCOM
2007
IEEE
13 years 10 months ago
Measurement-Based Self Organization of Interfering 802.11 Wireless Access Networks
— The popularity of IEEE 802.11 WLANs has led to dense deployments in urban areas. High density leads to suboptimal performance unless the interfering networks learn how to optim...
Bruno Kauffmann, François Baccelli, Augusti...
ICC
2007
IEEE
125views Communications» more  ICC 2007»
13 years 10 months ago
SFRIC: A Secure Fast Roaming Scheme in Wireless LAN Using ID-Based Cryptography
In a wireless network composed of multiple access points, a long delay during roaming from one access point to another may cause a disruption for streaming traffic. Roaming in wire...
Yoohwan Kim, Wei Ren, Ju-Yeon Jo, Yingtao Jiang, J...
ICC
2007
IEEE
103views Communications» more  ICC 2007»
13 years 10 months ago
On the Relay-Based Coverage Extension for Non-Conventional Multi-Hop Wireless Networks
Abstract— Due to the rapid growth of personal communications, it is now believed that multi-hop topologies will certainly play a key role in forthcoming wireless communications s...
Ramón Agüero, Johnny Choque, Luis Mu&n...
ICCCN
2008
IEEE
13 years 10 months ago
A Lightweight Solution for Defending Against Deauthentication/Disassociation Attacks on 802.11 Networks
In this paper we investigate a special type of denial of service (DoS) attack on 802.11-based networks, namely deauthentication/disassociation attack. In the current IEEE 802.11 s...
Thuc D. Nguyen, Duc H. M. Nguyen, Bao N. Tran, Hai...
ICCCN
2008
IEEE
13 years 10 months ago
Fingerprint-Based Location Estimation with Virtual Access Points
— Location fingerprinting techniques generally make use of existing wireless network infrastructure. Consequently, the positions of the access points (APs), which constitute an ...
A. K. M. Mahtab Hossain, Hien Nguyen Van, Wee-Seng...
ICASSP
2008
IEEE
13 years 10 months ago
Optimal stochastic dual resource allocation for cognitive radios based on quantized CSI
The present paper deals with dynamic resource management based on quantized channel state information (CSI) for multi-carrier cognitive radio networks comprising primary and secon...
Antonio G. Marqués, Xin Wang, Georgios B. G...