Sciweavers

524 search results - page 32 / 105
» Modeling and computing throughput capacity of wireless multi...
Sort
View
MSWIM
2004
ACM
15 years 5 months ago
Modeling wireless shadow networks
In case of natural disasters or intentional attacks, telecommunication networks often get heavily damaged and current resilience schemes have proven to be insufficient for rapid r...
Filip De Turck, Aurel A. Lazar
JSAC
2007
180views more  JSAC 2007»
14 years 11 months ago
A Cross-Layer Approach for WLAN Voice Capacity Planning
— This paper presents an analytical approach to determining the maximum number of on/off voice flows that can be supported over a wireless local area network (WLAN), under a qua...
Yu Cheng, Xinhua Ling, Wei Song, Lin X. Cai, Weihu...
WCNC
2008
IEEE
15 years 6 months ago
Computing TCP Throughput in a UMTS Network
— We compute the throughput obtained by a TCP connection in a UMTS environment. For downloading data at a mobile terminal, the packets of each TCP connection are stored in separa...
Kunde Anand, Vinod Sharma
ICC
2008
IEEE
142views Communications» more  ICC 2008»
15 years 6 months ago
Maximal Scheduling in a Hypergraph Model for Wireless Networks
— We introduce a hypergraph based interference model for scheduling in wireless networks. As a generalization of the graph model, hypergraph considers the conflicts caused by su...
Qiao Li, Gyouhwan Kim, Rohit Negi
WOWMOM
2005
ACM
111views Multimedia» more  WOWMOM 2005»
15 years 5 months ago
Performance Analysis of the IEEE 802.11 MAC and Physical Layer Protocol
We present in this paper an analytical model that accounts for the positions of stations with respect to the Access Point (AP) while evaluating the performance of 802.11 MAC layer...
Mohammad Hossein Manshaei, Gion Reto Cantieni, Cha...