Sciweavers

6122 search results - page 1130 / 1225
» Securing network access in wireless sensor networks
Sort
View
INFOCOM
2006
IEEE
15 years 4 months ago
Extracting a Mobility Model from Real User Traces
Abstract— Understanding user mobility is critical for simulations of mobile devices in a wireless network, but current mobility models often do not reflect real user movements. ...
Minkyong Kim, David Kotz, Songkuk Kim
MIPS
2004
Springer
108views Multimedia» more  MIPS 2004»
15 years 3 months ago
Residual Motion Coding Method for Error Resilient Transcoding System
Abstract. For video adaptation in universal multimedia access systems, video contents have to be transcoded according to the requirements of network bandwidth and the performance o...
June-Sok Lee, Goo-Rak Kwon, Jae-Won Kim, Kyung-Hoo...
HUC
2009
Springer
15 years 2 months ago
A Long-Duration Study of User-Trained 802.11 Localization
We present an indoor wireless localization system that is capable of room-level localization based solely on 802.11 network signal strengths and usersupplied training data. Our sys...
Andrew Barry, Benjamin Fisher, Mark L. Chang
INFOCOM
2011
IEEE
14 years 1 months ago
Feasibility and optimization of delay guarantees for non-homogeneous flows in IEEE 802.11 WLANs
—Due to the rapid growth of real-time applications and the ubiquity of IEEE 802.11 MAC as a layer-2 protocol for wireless local area networks (WLANs), it is of increasing interes...
Yan Gao, Chee Wei Tan, Ying Huang, Zheng Zeng, P. ...
USENIX
2004
14 years 11 months ago
Time-based Fairness Improves Performance in Multi-Rate WLANs
The performance seen by individual clients on a wireless local area network (WLAN) is heavily influenced by the manner in which wireless channel capacity is allocated. The popular...
Godfrey Tan, John V. Guttag
« Prev « First page 1130 / 1225 Last » Next »