Sciweavers

146 search results - page 11 / 30
» wi 2008
Sort
View
115
Voted
JNW
2008
97views more  JNW 2008»
15 years 13 days ago
Secure Multicast in WiMAX
Abstract-- Multicast enables efficient large-scale content distribution and has become more and more popular in network service. Security is a critical issue for multicast because ...
Sen Xu, Chin-Tser Huang, Manton M. Matthews
CONEXT
2008
ACM
15 years 2 months ago
Waiting-line auction for WiFi pricing
We model the relationship between a WLAN access point (AP) and a paying mobile station (MS) as a waiting-line auction [1] in which clients bids for transmission using the length o...
Tao Han, Liang Ma, Yuan'an Liu
VTC
2008
IEEE
134views Communications» more  VTC 2008»
15 years 6 months ago
Comparison of Various Frequency Reuse Patterns for WiMAX Networks with Adaptive Beamforming
—In this paper, we evaluate the performance of a WiMAX network in different frequency reuse scenarios with and without adaptive beaforming technique. We study the possibility of ...
Masood Maqbool, Marceau Coupechoux, Philippe Godle...
106
Voted
GLOBECOM
2008
IEEE
15 years 7 months ago
Cross-Layer Error Control Optimization in WiMAX
—WiMAX is one of the most promising emerging broadband wireless technologies. As a consequence, data transfer performance optimization represents a crucial issue due to TCP limit...
Dzmitry Kliazovich, Tommaso Beniero, Sergio Dalsas...
98
Voted
LCN
2008
IEEE
15 years 6 months ago
Hyperbolic location estimation of malicious nodes in mobile WiFi/802.11 networks
—Hyperbolic position bounding (HPB) provides a mechanism to probabilistically delimit the location of a wireless network malicious insider to a candidate area. A large scale path...
Christine Laurendeau, Michel Barbeau