Sciweavers

1505 search results - page 229 / 301
» On wireless network scheduling with intersession network cod...
Sort
View
108
Voted
BROADNETS
2007
IEEE
15 years 8 months ago
Detecting protected layer-3 rogue APs
— Unauthorized rogue access points (APs), such as those brought into a corporate campus by employees, pose a security threat as they may be poorly managed or insufficiently secu...
Hongda Yin, Guanling Chen, Jie Wang
AHSWN
2010
130views more  AHSWN 2010»
15 years 1 months ago
How Good is Opportunistic Routing? - A Reality Check under Rayleigh Fading Channels
Considerations of realistic channel dynamics motivate the design of a new breed of opportunistic schemes, such as opportunistic transmission, scheduling and routing. Compared to t...
Rong Zheng, Chengzhi Li
ADHOCNETS
2010
Springer
14 years 10 months ago
Guaranteeing Reliable Communications in Mesh Beacon-Enabled IEEE802.15.4 WSN for Industrial Monitoring Applications
Wireless Sensor Networks (WSN) are a very promising solution for industrial monitoring applications in terms of safety, costs, efficiency and productivity. However, in order to mov...
Berta Carballido Villaverde, Susan Rea, Dirk Pesch
WCNC
2008
IEEE
15 years 8 months ago
Improving STBC Performance in IEEE 802.11n Using Group-Orthogonal Frequency Diversity
—This paper proposes the use of group-orthogonal frequency diversity combined with space-time block coding (STBC) to improve the performance of IEEE 802.11n wireless networks (WL...
Felip Riera-Palou, Guillem Femenias
ICC
2007
IEEE
170views Communications» more  ICC 2007»
15 years 8 months ago
Policy-Based QoS-Aware Packet Scheduling for CDMA 1x Ev-DO
— CDMA 1x Ev-DO is an evolution of the CDMA2000 3G wireless standard to enable high rate packet data services up to 2.4Mbps in Rev 0, 3.1Mbps in Rev A, and 4.9Mbps in Rev B. To s...
Jinho Hwang, M. Tamer Refaei, Hyeong-Ah Choi, Jae-...