Sciweavers

2068 search results - page 131 / 414
» Performance Analysis of a Distributed Wireless Access Scheme
Sort
View
TON
2012
13 years 6 months ago
Opportunistic Spectrum Access in Multiple-Primary-User Environments Under the Packet Collision Constraint
—Cognitive Radio (CR) technology has great potential to alleviate spectrum scarcity in wireless communications. It allows secondary users (SUs) to opportunistically access spectr...
Eric Jung, Xin Liu
ICC
2009
IEEE
150views Communications» more  ICC 2009»
15 years 1 months ago
Interference-Aware Channel Assignments with Seamless Multi-Channel Monitoring in Wireless Mesh Networks
The wireless mesh networks (WMNs) are statically deployed on heterogeneous areas and are operating in open wireless media, and thus it coexists with other networks operating on the...
Sunghun Kim 0002, Jongsub Cha, Joongsoo Ma
143
Voted
VTC
2007
IEEE
15 years 10 months ago
Performance Modelling and Analysis of the Sleep-Mode in IEEE802.16e WMAN
In this study, we analyze the sleep-mode operation for power management of a mobile station in the IEEE802.16e Wireless Metropolitan Access Network. For the analysis we use the M/...
Yunju Park, Gang Uk Hwang
ACSAC
2005
IEEE
15 years 9 months ago
An Integrity Verification Scheme for DNS Zone file based on Security Impact Analysis
The Domain Name System (DNS) is the world’s largest distributed computing system that performs the key function of translating user-friendly domain names to IP addresses through...
Ramaswamy Chandramouli, Scott Rose
INFOCOM
2005
IEEE
15 years 9 months ago
Gossip algorithms: design, analysis and applications
Abstract— Motivated by applications to sensor, peer-topeer and ad hoc networks, we study distributed asynchronous algorithms, also known as gossip algorithms, for computation and...
Stephen P. Boyd, Arpita Ghosh, Balaji Prabhakar, D...