Sciweavers

10044 search results - page 1860 / 2009
» Authentication in Wireless Networks
Sort
View
BROADNETS
2007
IEEE
15 years 11 months ago
TCP dynamics over IEEE 802.11E WLANs: Modeling and throughput enhancement
— Today, IEEE 802.11 Wireless LAN (WLAN) has become a prevailing solution for broadband wireless Internet access while Transport Control Protocol (TCP) is the dominant transport ...
Jeonggyun Yu, Sunghyun Choi, Daji Qiao
MOBICOM
2006
ACM
15 years 11 months ago
Analysis and implications of student contact patterns derived from campus schedules
Characterizing mobility or contact patterns in a campus environment is of interest for a variety of reasons. Existing studies of these patterns can be classified into two basic a...
Vikram Srinivasan, Mehul Motani, Wei Tsang Ooi
175
Voted
SIGMETRICS
2005
ACM
197views Hardware» more  SIGMETRICS 2005»
15 years 10 months ago
On the performance characteristics of WLANs: revisited
Wide-spread deployment of infrastructure WLANs has made Wi-Fi an integral part of today’s Internet access technology. Despite its crucial role in affecting end-to-end performan...
Sunwoong Choi, Kihong Park, Chong-kwon Kim
VSTTE
2005
Springer
15 years 10 months ago
Performance Validation on Multicore Mobile Devices
The validation of modern software systems on mobile devices needs to incorporate both functional and non-functional requirements. While some progress has been made in validating pe...
Thomas Hubbard, Raimondas Lencevicius, Edu Metz, G...
137
Voted
SAINT
2003
IEEE
15 years 10 months ago
A Generalized Target-Driven Cache Replacement Policy for Mobile Environments
Caching frequently accessed data items on the client side is an effective technique to improve the system performance in wireless networks. Due to cache size limitations, cache re...
Liangzhong Yin, Guohong Cao, Ying Cai
« Prev « First page 1860 / 2009 Last » Next »