Sciweavers

2268 search results - page 328 / 454
» Modeling wireless shadow networks
Sort
View
ICNP
2003
IEEE
15 years 10 months ago
Delay Analysis of IEEE 802.11 in Single-Hop Networks
This paper presents an analytical model to compute the average service time and jitter experienced by a packet when transmitted in a saturated IEEE 802.11 ad hoc network. In contr...
Marcelo M. Carvalho, J. J. Garcia-Luna-Aceves
PERCOM
2006
ACM
16 years 4 months ago
Introducing History-Enriched Security Context Transfer to Enhance the Security of Subsequent Handover
Many solutions for securing inter-provider handover proposed to date make use of the concept of security context transfer. However, none of these solutions addresses problems aris...
Ulrike Meyer, Susanne Wetzel
143
Voted
PERCOM
2004
ACM
16 years 4 months ago
Towards a Better Understanding of Context Attributes
The use of context as an input is one of the major characteristics of Ubiquitous Computing systems. This paper looks into the structural and the systematic features of context in ...
Tobias Zimmer
IWCMC
2009
ACM
15 years 11 months ago
Carrier sense multiple access with enhanced collision avoidance: a performance analysis
Abstract—Carrier Sense Multiple Access with Enhanced Collision Avoidance (CSMA/ECA) is a recently proposed modification to the well-known CSMA/CA protocol. By using a determinis...
Jaume Barceló, Boris Bellalta, Cristina Can...
113
Voted
CONEXT
2008
ACM
15 years 6 months ago
Waiting-line auction for WiFi pricing
We model the relationship between a WLAN access point (AP) and a paying mobile station (MS) as a waiting-line auction [1] in which clients bids for transmission using the length o...
Tao Han, Liang Ma, Yuan'an Liu