Sciweavers

659 search results - page 89 / 132
» RED for Improving TCP over Wireless Networks
Sort
View
SIGMOD
1994
ACM
175views Database» more  SIGMOD 1994»
15 years 3 months ago
Sleepers and Workaholics: Caching Strategies in Mobile Environments
In the mobile wireless computing environment of the future, a large number of users, equipped with low-powered palmtop machines, will query databases over wireless communication ch...
Daniel Barbará, Tomasz Imielinski
CONEXT
2009
ACM
15 years 7 days ago
ARES: an anti-jamming reinforcement system for 802.11 networks
Dense, unmanaged 802.11 deployments tempt saboteurs into launching jamming attacks by injecting malicious interference. Nowadays, jammers can be portable devices that transmit int...
Konstantinos Pelechrinis, Ioannis Broustis, Srikan...
ICASSP
2011
IEEE
14 years 2 months ago
RSS-based node localization in the presence of attenuating objects
Node localization is an important task in the context of wireless sensor networks. Although algorithms already exist to carry out localization using measurements of received signa...
Andrea Edelstein, Xi Chen, Yunpeng Li, Michael Rab...
ICC
2007
IEEE
200views Communications» more  ICC 2007»
15 years 5 months ago
Joint Resource Allocation and Routing for OFDMA-Based Broadband Wireless Mesh Networks
— In this paper, we investigate joint resource allocation and routing for a wireless mesh network consisting of fixed access points inter-connected through multi-channel wireles...
Kemal Karakayali, Joseph H. Kang, Murali S. Kodial...
CORR
2012
Springer
198views Education» more  CORR 2012»
13 years 6 months ago
Token-DCF: An Opportunistic MAC protocol for Wireless Networks
—IEEE 802.11 DCF is the MAC protocol currently used in wireless LANs. 802.11 DCF is inefficient due to two types of overhead; channel idle time and collision time. This paper pr...
Ghazale Hosseinabadi, Nitin H. Vaidya