Sciweavers

269 search results - page 44 / 54
» Interference-Aware Channel Assignment in Wireless Mesh Netwo...
Sort
View
MSWIM
2006
ACM
15 years 3 months ago
Two methods of authenticated positioning
Recent studies and publications have shown a demand for a secure method to proof someones or somenthings position via a communication channel. In this paper we present a concept a...
Thomas Mundt
ICMCS
2006
IEEE
121views Multimedia» more  ICMCS 2006»
15 years 3 months ago
Packet Loss Modeling for Perceptually Optimized 3D Transmission
Transmissions over wireless and other unreliable networks can lead to packet loss. An area that has received limited research attention is how to tailor multimedia information tak...
Irene Cheng, Lihang Ying, Anup Basu
94
Voted
MONET
2002
155views more  MONET 2002»
14 years 9 months ago
A Prioritized Real-Time Wireless Call Degradation Framework for Optimal Call Mix Selection
This paper describes a framework for selecting the optimal call mix to be admitted while employing a bandwidth degradation policy in a wireless cellular network. The optimal proper...
Gergely V. Záruba, Imrich Chlamtac, Sajal K...
TWC
2010
14 years 4 months ago
Mitigating selective forwarding attacks with a channel-aware approach in WMNs
In this paper, we consider a special case of denial of service (DoS) attack in wireless mesh networks (WMNs) known as selective forwarding attack (a.k.a gray hole attacks). With su...
Devu Manikantan Shila, Yu Cheng, Tricha Anjali
JCM
2006
92views more  JCM 2006»
14 years 9 months ago
Ultimate Dynamic Spectrum Allocation via User-Central Wireless Systems
- Current wireless systems are called vendor-central systems because, users should subscribe to a service provider (vendor) and receive the service through the spectrum assigned to...
Seyed Alireza Zekavat, Xiukui Li