Sciweavers

533 search results - page 87 / 107
» On security-aware transmission scheduling
Sort
View
TON
2010
192views more  TON 2010»
14 years 4 months ago
Delay analysis for wireless networks with single hop traffic and general interference constraints
We consider a class of wireless networks with general interference constraints on the set of links that can be served simultaneously at any given time. We restrict the traffic to b...
Gagan Raj Gupta, Ness B. Shroff
CORR
2007
Springer
124views Education» more  CORR 2007»
14 years 9 months ago
Anonymous Networking amidst Eavesdroppers
—The problem of security against packet timing based traffic analysis in wireless networks is considered in this work. An analytical measure of “anonymity” of routes in eave...
Parvathinathan Venkitasubramaniam, Ting He, Lang T...
VTC
2007
IEEE
108views Communications» more  VTC 2007»
15 years 4 months ago
Multiuser MIMO: Principle, Performance in Measured Channels and Applicable Service
—The exploitation of multiuser diversity and the application of multiple antennas at transmitter and receiver are considered to be key technologies for future highly bandwidtheff...
Gerhard Bauch, Pedro Tejera, Christian Guthy, Wolf...
MOBICOM
2004
ACM
15 years 3 months ago
Exploiting medium access diversity in rate adaptive wireless LANs
Recent years have seen the growing popularity of multi-rate wireless network devices (e.g., 802.11a cards) that can exploit variations in channel conditions and improve overall ne...
Zhengrong Ji, Yi Yang, Junlan Zhou, Mineo Takai, R...
106
Voted
SIGCOMM
1999
ACM
15 years 2 months ago
An Integrated Congestion Management Architecture for Internet Hosts
This paper presents a novel framework for managing network congestion from an end-to-end perspective. Our work is motivated by several trends in traffic patterns that threaten th...
Hari Balakrishnan, Hariharan Shankar Rahul, Sriniv...