135
click to vote
MSWIM
15 years 6 months ago
2005 ACM
The increase of IEEE 802.11’s bandwidth led to a deployment of many multimedia applications over wireless networks. Nevertheless, these applications impose stringent constraints...
112
click to vote
MSWIM
15 years 6 months ago
2005 ACM
A number of analytical models have been proposed to describe the priority schemes of the Enhanced Distributed Channel Access (EDCA) mechanism of the IEEE 802.11e standard. EDCA pr...
124
Voted
MSWIM
15 years 6 months ago
2005 ACM
Wireless Local Area Networks (WLAN) are being deployed at a rapid pace and in different environments. As a result, the demand for supporting a diverse range of applications over w...
115
click to vote
MSWIM
15 years 6 months ago
2005 ACM
There have been various secure routing protocols proposed for mobile ad hoc networks. Most of these protocols are analyzed by two standard techniques: simulation and security anal...
105
Voted
MSWIM
15 years 6 months ago
2005 ACM
Motivated by the tradeoff between security and efficiency performance parameters that has been imposed on all modern wireless security protocols, we designed a novel security syst...
|