Sciweavers

5234 search results - page 942 / 1047
» Simulation of Computer Network Attacks
Sort
View
ICC
2007
IEEE
153views Communications» more  ICC 2007»
15 years 9 months ago
An End-to-End Technique to Estimate the Transmission Rate of an IEEE 802.11 WLAN
— The deployment of wireless LANs (WLANs) has been steadily increasing over the years and estimating the actual bit rate of a WLAN device is important for management and applicat...
Antonio Augusto de Aragão Rocha, Rosa Maria...
ICC
2007
IEEE
128views Communications» more  ICC 2007»
15 years 9 months ago
Delay and Power Efficient Voice Transmission over MANET
: Increasing speed of hardware device and versatile functionalities of small equipments e.g. laptop, PDA etc. are introducing various voice oriented applications with mobility. Lik...
Md. Golam Kaosar, Tarek R. Sheltami, Ashraf S. Has...
ICDM
2007
IEEE
145views Data Mining» more  ICDM 2007»
15 years 9 months ago
Using Data Mining to Estimate Missing Sensor Data
Estimating missing sensor values is an inherent problem in sensor network applications; however, existing data estimation approaches do not apply well to the context of datastream...
Le Gruenwald, Hamed Chok, Mazen Aboukhamis
130
Voted
ICNP
2007
IEEE
15 years 9 months ago
Geographically Informed Inter-Domain Routing
Abstract— We propose to add geographic location information into BGP routing updates to enable Geographically Informed Inter-Domain Routing (GIRO). GIRO departs from previous geo...
Ricardo V. Oliveira, Mohit Lad, Beichuan Zhang, Li...
129
Voted
ICNP
2007
IEEE
15 years 9 months ago
Distributed Delay Estimation and Call Admission Control in IEEE 802.11 WLANs
—Voice over WiFi (VoWiFi) will soon be the main alternative to cellular phones. Providing a satisfactory user experience remains difficult, however. We focus on Call Admission C...
Kenta Yasukawa, Andrea G. Forte, Henning Schulzrin...