Sciweavers

2268 search results - page 358 / 454
» Modeling wireless shadow networks
Sort
View
123
Voted
GLOBECOM
2007
IEEE
15 years 11 months ago
Extension and Comparison of QoS-Enabled Wi-Fi Models in the Presence of Errors
—In this paper we compare and enhance the three prevailing approaches of IEEE 802.11e Performance analysis. Specifically, the first model utilizes a Markov Chain to describe th...
Ioannis Papapanagiotou, Georgios S. Paschos, Stavr...
ICOIN
2007
Springer
15 years 11 months ago
Inter-Domain Access Volume Model: Ranking Autonomous Systems
Exploring topological structure at Autonomous System (AS) level is indispensable for understanding most issues in Internet services. Previous models of AS graph involve address or ...
Yixuan Wang, Ye Wang, Maoke Chen, Xing Li
COMPSEC
2006
97views more  COMPSEC 2006»
15 years 5 months ago
Towards a location-based mandatory access control model
With the growing use of wireless networks and mobile devices, we are moving towards an era where location information will be necessary for access control. The use of location inf...
Indrakshi Ray, Mahendra Kumar
EJWCN
2010
156views more  EJWCN 2010»
14 years 11 months ago
On Performance Modeling of Ad Hoc Routing Protocols
Simulation studies have been the predominant method of evaluating ad hoc routing algorithms. Despite their wide use and merits, simulations are generally time consuming. Furthermo...
Muhammad Saleem, Syed Ali Khayam, Muddassar Farooq
CORR
2007
Springer
172views Education» more  CORR 2007»
15 years 4 months ago
Analysis of the 802.11e Enhanced Distributed Channel Access Function
The IEEE 802.11e standard revises the Medium Access Control (MAC) layer of the former IEEE 802.11 standard for Quality-of-Service (QoS) provision in the Wireless Local Area Networ...
Inanc Inan, Feyza Keceli, Ender Ayanoglu