Sciweavers

2268 search results - page 416 / 454
» Modeling wireless shadow networks
Sort
View
BTW
2007
Springer
189views Database» more  BTW 2007»
15 years 10 months ago
Reconsidering Consistency Management in Shared Data Spaces for Emergency and Rescue Applications
: Efficient information sharing is very important for emergency and rescue operations. These operations often have to be performed in environments where no communication infrastruc...
Thomas Plagemann, Ellen Munthe-Kaas, Vera Goebel
IWCMC
2006
ACM
15 years 10 months ago
Uplink capacity comparison of non-perfect frequency synchronized cellular OFDM systems
Orthogonal frequency division multiplexing (OFDM) is very sensitive to frequency offsets which result in considerable interference. Performance of the system will be exacerbated ...
Shameem Kabir Chaudhury, Hrishikesh Venkataraman, ...
NDSS
2005
IEEE
15 years 10 months ago
Security Analysis and Improvements for IEEE 802.11i
This paper analyzes the IEEE 802.11i wireless networking standard with respect to data confidentiality, integrity, mutual authentication, and availability. Under our threat model,...
Changhua He, John C. Mitchell
QSHINE
2005
IEEE
15 years 10 months ago
Enhancing the IEEE 802.11e in QoS Support: Analysis and Mechanisms
Despite its support of prioritized services, the IEEE 802.11e Enhanced Distributed Channel Access (EDCA) cannot guarantee strict QoS required by real-time services such as voice a...
Xiang Chen, Hongqiang Zhai, Yuguang Fang
WIOPT
2005
IEEE
15 years 10 months ago
Performance Measurements of the Saturation Throughput in IEEE 802.11 Access Points
— Performance measurements of IEEE 802.11 access points provide important information for networking research and network management. In this paper, we present an active measurem...
Enrico Pelletta, Hector Velayos