149
click to vote
MSWIM
15 years 7 months ago
2005 ACM
The increase of IEEE 802.11’s bandwidth led to a deployment of many multimedia applications over wireless networks. Nevertheless, these applications impose stringent constraints...
123
click to vote
MSWIM
15 years 7 months ago
2005 ACM
A number of analytical models have been proposed to describe the priority schemes of the Enhanced Distributed Channel Access (EDCA) mechanism of the IEEE 802.11e standard. EDCA pr...
139
Voted
MSWIM
15 years 7 months ago
2005 ACM
Wireless Local Area Networks (WLAN) are being deployed at a rapid pace and in different environments. As a result, the demand for supporting a diverse range of applications over w...
129
click to vote
MSWIM
15 years 7 months ago
2005 ACM
There have been various secure routing protocols proposed for mobile ad hoc networks. Most of these protocols are analyzed by two standard techniques: simulation and security anal...
122
click to vote
MSWIM
15 years 7 months ago
2005 ACM
Motivated by the tradeoff between security and efficiency performance parameters that has been imposed on all modern wireless security protocols, we designed a novel security syst...
|