Sciweavers

WICON
2008
13 years 6 months ago
Security challenges in seamless mobility: how to "handover" the keys?
In this paper, we discuss key management challenges for seamless handovers across heterogeneous wireless networks. We focus on utilizing existing keying material from previous acc...
Katrin Hoeper, Lidong Chen, Antonio Izquierdo, Nad...
WICON
2008
13 years 6 months ago
HxH: a hop-by-hop transport protocol for multi-hop wireless networks
TCP can perform poorly in multi-hop wireless networks due to problems that arise with contention and mobility. Endto-end protocols are at an inherent disadvantage in trying to sol...
Daniel Scofield, Lei Wang, Daniel Zappala
WICON
2008
13 years 6 months ago
Channel assignment with partially overlapping channels in wireless mesh networks
Many efforts have been devoted to maximizing the network throughput with limited channel resources in multi-radio multi-channel wireless mesh networks. It has been believed that t...
Yong Ding, Yi Huang, Guo-Kai Zeng, Li Xiao
WICON
2008
13 years 6 months ago
Constructing accurate, space-efficient, wireless coverage maps for vehicular contexts
Wireless connectivity for vehicles is a fast-growing market, with a plethora of different network technologies already in use. Surveys of the numbers of IEEE 802.11b/g access poin...
David N. Cottingham, Robert K. Harle, Andy Hopper
WICON
2008
13 years 6 months ago
Towards optimally exploiting physical layer information in OFDM wireless networks
Wireless communication is inherently vulnerable in nature and packets can be corrupted due to various reasons. The network performance can potentially be improved if one is able t...
Zheng Zeng, P. R. Kumar
WICON
2008
13 years 6 months ago
A network mobility management scheme for fast QoS handover
The evolution of wireless access technologies has led to a new era of Mobile Internet. Network mobility, which considers the mobility of an entire network, is particularly suitabl...
Cheng-Wei Lee, Meng Chang Chen, Yeali S. Sun
WICON
2008
13 years 6 months ago
The effect of cooperation at the network protocol level
Abstract--There has been a great deal of attention on cooperative communication which exploits the spatial diversity among antennas belonging to multiple terminals. Most of the exi...
Beiyu Rong, Anthony Ephremides
WICON
2008
13 years 6 months ago
A fluid-flow model for backlog-based CSMA policies
We present a fluid flow model to analyze backlog-based CSMA policies. The model is obtained using a CSMA fixed point approximation that has been recently proposed and analyzed. We...
Atilla Eryilmaz, Peter Marbach, Asuman E. Ozdaglar
WICON
2008
13 years 6 months ago
Comparative performance evaluation of idle mode location management schemes for IEEE 802.16j multihop relay networks
IEEE 802.16 WiMAX is a promising technology to provide broadband wireless networking access. IEEE 802.16j Mobile Multihop Relay standard introduces multihop relaying to WiMAX syst...
Kuan-Po Lin, Hung-Yu Wei
WICON
2008
13 years 6 months ago
Exploiting parallel networks using dynamic channel scheduling
Many researchers have been focusing on the outcomes and consequences of the rapid increase and proliferation of mobile wireless technologies. If it is not already the case, it wil...
Lara B. Deek, Kevin C. Almeroth, Mike P. Wittie, K...