Sciweavers

146 search results - page 11 / 30
» wi 2008
Sort
View
JNW
2008
97views more  JNW 2008»
14 years 9 months ago
Secure Multicast in WiMAX
Abstract-- Multicast enables efficient large-scale content distribution and has become more and more popular in network service. Security is a critical issue for multicast because ...
Sen Xu, Chin-Tser Huang, Manton M. Matthews
CONEXT
2008
ACM
14 years 11 months ago
Waiting-line auction for WiFi pricing
We model the relationship between a WLAN access point (AP) and a paying mobile station (MS) as a waiting-line auction [1] in which clients bids for transmission using the length o...
Tao Han, Liang Ma, Yuan'an Liu
VTC
2008
IEEE
134views Communications» more  VTC 2008»
15 years 3 months ago
Comparison of Various Frequency Reuse Patterns for WiMAX Networks with Adaptive Beamforming
—In this paper, we evaluate the performance of a WiMAX network in different frequency reuse scenarios with and without adaptive beaforming technique. We study the possibility of ...
Masood Maqbool, Marceau Coupechoux, Philippe Godle...
GLOBECOM
2008
IEEE
15 years 3 months ago
Cross-Layer Error Control Optimization in WiMAX
—WiMAX is one of the most promising emerging broadband wireless technologies. As a consequence, data transfer performance optimization represents a crucial issue due to TCP limit...
Dzmitry Kliazovich, Tommaso Beniero, Sergio Dalsas...
LCN
2008
IEEE
15 years 3 months ago
Hyperbolic location estimation of malicious nodes in mobile WiFi/802.11 networks
—Hyperbolic position bounding (HPB) provides a mechanism to probabilistically delimit the location of a wireless network malicious insider to a candidate area. A large scale path...
Christine Laurendeau, Michel Barbeau