Sciweavers

3486 search results - page 348 / 698
» System Design and Networking Protocols for Wireless Position...
Sort
View
178
Voted
GLOBECOM
2010
IEEE
15 years 1 months ago
Cognitive Network Inference through Bayesian Network Analysis
Cognitive networking deals with applying cognition to the entire network protocol stack for achieving stack-wide as well as network-wide performance goals, unlike cognitive radios ...
Giorgio Quer, Hemanth Meenakshisundaram, Tamma Bhe...
142
Voted
INFOCOM
2003
IEEE
15 years 9 months ago
A Bandwidth Guaranteed Polling MAC Protocol for Ethernet Passive Optical Networks
While the backbone networks have experienced substantial changes in the last decade; the access networks have not changed much. Recently, passive optical networks (PONs) seem to be...
Maode Ma
129
Voted
RTAS
1995
IEEE
15 years 7 months ago
Design and evaluation of a window-consistent replication service
—Real-time applications typically operate under strict timing and dependability constraints. Although traditional data replication protocols provide fault tolerance, real-time gu...
Ashish Mehra, Jennifer Rexford, Hock-Siong Ang, Fa...
128
Voted
AHSWN
2010
130views more  AHSWN 2010»
15 years 3 months ago
How Good is Opportunistic Routing? - A Reality Check under Rayleigh Fading Channels
Considerations of realistic channel dynamics motivate the design of a new breed of opportunistic schemes, such as opportunistic transmission, scheduling and routing. Compared to t...
Rong Zheng, Chengzhi Li
138
Voted
GLOBECOM
2010
IEEE
15 years 1 months ago
Practical Defenses for Evil Twin Attacks in 802.11
Open-access 802.11 wireless networks are commonly deployed in cafes, bookstores, and other public spaces to provide free Internet connectivity. These networks are convenient to dep...
Harold Gonzales, Kevin S. Bauer, Janne Lindqvist, ...