Sciweavers

5234 search results - page 721 / 1047
» Simulation of Computer Network Attacks
Sort
View
158
Voted
VTC
2006
IEEE
101views Communications» more  VTC 2006»
15 years 11 months ago
A Virtual Slot Multiple Access for IEEE 802.15.3 High-Rate Wireless Personal Area Networks
—The IEEE 802.15.3 has introduced a type of time division multiple access (TDMA) which allocates the variable length of timeslot within a constant time interval. However, it need...
Do-Youn Hwang, Eui Hyeok Kwon, Jae-Sung Lim
124
Voted
EUC
2005
Springer
15 years 10 months ago
PULSE: A MAC Protocol for RFID Networks
1 The reader collision problem occurs when the signal from one reader interferes with the signal from other readers. Solutions like RTS-CTS are not applicable because a reader may ...
Shailesh M. Birari, Sridhar Iyer
INFOCOM
2002
IEEE
15 years 10 months ago
Optimal MAC State Switching for cdma2000 Networks
— This paper deals with the performance modeling of the various MAC states as defined by the cdma2000 protocol. Our method uses a composite performance metric which has the capa...
Mainak Chatterjee, Sajal K. Das
SIGMETRICS
2002
ACM
103views Hardware» more  SIGMETRICS 2002»
15 years 4 months ago
Network tomography on general topologies
In this paper we consider the problem of inferring link-level loss rates from end-to-end multicast measurements taken from a collection of trees. We give conditions under which lo...
Tian Bu, Nick G. Duffield, Francesco Lo Presti, Do...
TSMC
2010
14 years 11 months ago
Distributed Explicit Rate Schemes in Multi-Input-Multi-Output Network Systems
Abstract--With the ever-increasing wireless/wired data applications recently, considerable efforts have focused on the design of distributed explicit rate flow control schemes for ...
Naixue Xiong, Athanasios V. Vasilakos, Laurence Ti...