Sciweavers

5234 search results - page 859 / 1047
» Simulation of Computer Network Attacks
Sort
View
ICPADS
2002
IEEE
15 years 9 months ago
The Impact of RTS Threshold on IEEE 802.11 MAC Protocol
Wireless technologies and applications received great attention in recent years. The medium access control (MAC) protocol is the main element that determines the efficiency in sha...
Shiann-Tsong Sheu, Tobias Chen, Jenhui Chen, Fun Y...
LCN
2002
IEEE
15 years 9 months ago
Optimization of AP Placement and Channel Assignment in Wireless LANs
—The design of a wireless local area network (WLAN) has an important issue of determining the optimal placement of access points (APs) and assignment of channels to them. WLAN se...
Youngseok Lee, Kyoungae Kim, Yanghee Choi
IWANN
2001
Springer
15 years 8 months ago
Neurobiological Modeling of Bursting Response During Visual Attention
: Thalamic neurons have an exclusive property named bursting response. Bursting response seems to have a critical role in producing saliency map and encoding conspicuity of locatio...
Reza Rajimehr, Leila Montaser Kouhsari
ICNP
2000
IEEE
15 years 8 months ago
SCalable Object-tracking through Unattended Techniques (SCOUT)
A scalable object location service can enable users to search for various objects in an environment where many small, networked devices are attached to objects. We investigate two...
Satish Kumar, Cengiz Alaettinoglu, Deborah Estrin
140
Voted
ICNP
1999
IEEE
15 years 8 months ago
On Individual and Aggregate TCP Performance
As the most widely used reliable transport in today's Internet, TCP has been extensively studied in the past. However, previous research usually only considers a small or med...
Lili Qiu, Yin Zhang, Srinivasan Keshav