Sciweavers

10044 search results - page 176 / 2009
» Authentication in Wireless Networks
Sort
View
ICCSA
2005
Springer
15 years 9 months ago
A Performance Improvement Scheme of Stream Control Transmission Protocol over Wireless Networks
Abstract. Today’s computer network is shifting from wired networks to wireless networks. Several attempts have been made to assess the performance of TCP over wireless networks. ...
Kiwon Hong, Kugsang Jeong, Deokjai Choi, Choong Se...
JNW
2007
135views more  JNW 2007»
15 years 3 months ago
Reliable Integrated Architecture for Heterogeneous Mobile and Wireless Networks
Abstract— The major trend in next-generation or 4G wireless networks (NGWN/4G) is the coexistence of diverse but complementary architectures and wireless access technologies. In ...
Christian Makaya, Samuel Pierre
WD
2010
15 years 1 months ago
Self-organized aggregation in irregular wireless networks
Gossip-based epidemic protocols are used to aggregate data in distributed systems. This fault-tolerant approach does neither require maintenance of any global network state nor kno...
Joanna Geibig, Dirk Bradler
TMC
2010
137views more  TMC 2010»
14 years 10 months ago
Unwanted Link Layer Traffic in Large IEEE 802.11 Wireless Networks
Wireless networks have evolved into an important technology for connecting users to the Internet. As the utility of wireless technology grows, wireless networks are being deployed ...
Ramya Raghavendra, Elizabeth M. Belding, Konstanti...
VTC
2007
IEEE
161views Communications» more  VTC 2007»
15 years 10 months ago
Early Results on Hydra: A Flexible MAC/PHY Multihop Testbed
— Hydra is a flexible wireless network testbed being developed at UT Austin. Our focus is networks that support multiple wireless hops and where the network, especially the MAC,...
Ketan Mandke, Soon-Hyeok Choi, Gibeom Kim, Robert ...