Sciweavers

2268 search results - page 39 / 454
» Modeling wireless shadow networks
Sort
View
WWIC
2009
Springer
119views Communications» more  WWIC 2009»
15 years 8 months ago
Handover Incentives for WLANs with Overlapping Coverage
Abstract. It is well known that in IEEE 802.11 networks, the assignment of low-rate and high-rate users to the same access point significantly degrades the performance of the high...
Xenofon Fafoutis, Vasilios A. Siris
PIMRC
2008
IEEE
15 years 8 months ago
The Wireless Engset Multi-Rate Loss Model for the Handoff traffic analysis in W-CDMA networks
—The call-level performance modelling and evaluation of 3G cellular networks is important for the proper network dimensioning and efficient use of the network resources, such as ...
Vassilios G. Vassilakis, Michael D. Logothetis
CONEXT
2009
ACM
15 years 3 months ago
Online optimization of 802.11 mesh networks
802.11 wireless mesh networks are ubiquitous, but suffer from severe performance degradations due to poor synergy between the 802.11 CSMA MAC protocol and higher layers. Several s...
Theodoros Salonidis, Georgios Sotiropoulos, Roch G...
WOWMOM
2000
ACM
96views Multimedia» more  WOWMOM 2000»
15 years 6 months ago
An integrated mobility and traffic model for resource allocation in wireless networks
In a wireless communications network, the movement of mobile users presents significant technical challenges to providing efficient access to the wired broadband network. In this ...
Hisashi Kobayashi, Shun-Zheng Yu, Brian L. Mark
AINA
2004
IEEE
15 years 5 months ago
Formal Verification of PAP and EAP-MD5 Protocols in Wireless Networks: FDR Model Checking
IEEE 802.1x and authentication server based security protocols are mainly used for enhancing security of wireless networks. In this paper, we specify PAP and EAP-MD5 based securit...
Il-Gon Kim, Jin-Young Choi