Ngày tải lên: 18/10/2013, 12:15
... Analytical modeling of TCP clients in Wi-Fi hot spot networks, in Proceedings of IFIP Networking (2004) 36. S Choi, K Park, C Kim, Performance impact of inter-layer dependency in infrastructure ... unfairness by reducing the chances of transmission for the sending stations in the way of increasing the minimum conten- tion window size. The downlink compensation access (DCA) algorithm in [16] gives ... and E-911 locating services, have recently been drawing much attention in wireless network community. Since LBSs rely on the location information in providing services and enhancing their service...
Ngày tải lên: 20/06/2014, 22:20
Báo cáo hóa học: " Minimum-length scheduling with rate control in wireless networks: a shortest path approach" docx
... proportional fairness in wireless networks, in Proceedings of Conference on Information Sciences and Systems (CISS) (2008) 24. A Pantelidou, A Ephremides, What is optimal scheduling in wireless networks? , in Proceedings ... problem of joint sche- duling and rate control in single-hop wireless networks under the objective of minimizing the required time to deliver all data traffic to the intended destinations. First, we ... (i.e. , [1-10]) studies the mini- mum-length schedul ing problem only for time-invariant wireless networks. Since the wireless channel in reality is time-varying, in the second part of this paper,...
Ngày tải lên: 20/06/2014, 22:20
Báo cáo hóa học: " Enabling location-aware quality-controlled access in wireless networks" ppt
... a wireless link error scenario comes into play in order to see whether the fairness is supported in t ime-varying unreliable wireless link, whi ch is to ver ify the role of ω s i in calculating per-location ... unfairness by reducing the chances of transmission for the sending stations in the way of increasing the minimum conten- tion window size. The downlink compensation access (DCA) algorithm in [16] gives ... contents-providing services, presence services, and E-911 locating services, have recently been drawing much attention in wireless network community. Since LBSs rely on the location information in providing...
Ngày tải lên: 21/06/2014, 00:20
Báo cáo hóa học: " Opportunistic scheduling policies for improved throughput guarantees in wireless networks" doc
Ngày tải lên: 21/06/2014, 01:20
báo cáo hóa học:" Research Article Quality-Aware SCTP in Wireless Networks" pdf
Ngày tải lên: 21/06/2014, 18:20
Báo cáo hóa học: "Research Article Cross-Layer Explicit Link Status Notification to Improve TCP Performance in Wireless Networks" potx
Ngày tải lên: 21/06/2014, 20:20
Báo cáo hóa học: " Research Article Multilayer Statistical Intrusion Detection in Wireless Networks" pptx
Ngày tải lên: 21/06/2014, 22:20
Báo cáo hóa học: " Editorial Cooperative Communications in Wireless Networks" ppt
Ngày tải lên: 21/06/2014, 22:20
Báo cáo hóa học: " Research Article Centroid Localization of Uncooperative Nodes in Wireless Networks Using a Relative Span Weighting Method" pot
Ngày tải lên: 21/06/2014, 23:20
Báo cáo hóa học: " Research Article An 802.11k Compliant Framework for Cooperative Handoff in Wireless Networks" docx
Ngày tải lên: 21/06/2014, 23:20
Báo cáo hóa học: " On Optimizing Compatible Security Policies in Wireless Networks" pdf
Ngày tải lên: 22/06/2014, 22:20
Báo cáo hóa học: " Systematic Errors and Location Accuracy in Wireless Networks" ppt
Ngày tải lên: 22/06/2014, 23:20
Tài liệu Designing for Profitability in the Physical Layer of Wireless Networks docx
... terminating cables. On the contrary, proper connectivity is a design philosophy combined with highly functional products for terminating, patching, accessing, and managing cables. Creating ... bends in routing paths, adding new fibers on top of existing fibers can greatly increase the pressure on existing fibers. As a result, fibers that have performed fine for years start showing increased ... Adding cards, elements, and circuits. Upgrading software and hardware. Integrating new elements with old elements. Not to mention routine maintenance and troubleshooting of a steadily growing...
Ngày tải lên: 21/12/2013, 08:17
Tài liệu WIRELESS NETWORKS FOR IN-BUILDING ENVIRONMENTS White doc
... or indoor cells, resulting in different quality of the mobile coverage inside the different buildings. 5 284 23-3026 Uen Rev B 2.2 Coverage using Dedicated In- Building RBS In- building ... believed to increase the need for in- building solutions. It can also be assumed that in most cases mobile Internet users will be sitting comfortably inside buildings, rather than walking around ... search, finding friends, staff communication etc. Some of the most used solutions for providing in- building coverage are described in the following subchapters. Figure 1 In- building coverage...
Ngày tải lên: 27/01/2014, 15:20
SECURITY IN WIRELESS SENSOR NETWORKS – IMPROVING THE LEAP PROTOCOL pptx
... after receiving his B.Sc. degree in electrical engineering; he worked as a broadcasting engineer for two years and is currently attempting to pursue his educational knowledge by undertaking a Ph.D ... functionalities in terms of one base station participating in one system. It is important to remember that with an increase in a sensor network there’s an increase in the distance separating the base ... in international journals and conferences in his areas of expertise. He is the co-chair of the International Joint Conferences on Computer, Information, and Systems Sciences, and Engineering...
Ngày tải lên: 05/03/2014, 23:20
Event-to-Sink Reliable Transport in Wireless Sensor Networks docx
... PROBLEM IN WSN In the preceding discussions, we introduced the notion of event-to-sink reliability in WSN and pointed out the inapplica- bility of existing transport solutions. Before proceeding ... reliable retasking/reprogramming in WSN. PSFQ is based on slowly injecting packets into the network, but performing aggressive hop-by-hop recovery in case of packet losses. The pump operation in PSFQ ... for wireless sensor networks, ” in Proc. ACM WSNA, Atlanta, GA, Sep. 2002, pp. 1–11. [13] J. Zhao and R. Govindan, “Understanding packet delivery performance in dense wireless sensor networks, ” in...
Ngày tải lên: 16/03/2014, 19:20
Game Theory in Wireless and Communication Networks: Theory, Models, and Applications
... 28 Wireless networks: an introduction computing devices such as laptops in LANs, but is now increasingly used for other services, including Internet and voice over IP (VoIP) phone access, gaming, ... networks, adopting centralized solu- tions for optimizing performance may yield inefficient results owing to errors occurring during the complex information-gathering phase. In contrast, local informa- tion ... broadband networks: uplink power control in CDMAnetworks, resource allocation in OFDMA networks, power control in femtocell networks, IEEE 802.16 broadband wireless access, and vertical handover in...
Ngày tải lên: 16/03/2014, 20:20
Security and Privacy Vulnerabilities of In-Car Wireless Networks: A Tire Pressure Monitoring System Case Study ppt
... the interstate highway I-26 (Columbia, South Carolina) with two cars running in par- allel at speeds exceeding 110 km/h. 4.2 Eavesdropping Range We measured the eavesdropping range in both indoor ... (2008), 3187–3199. 16 Eavesdropping range Indoor noise floor Outdoor noise floor Boosted range Amplified noise floor Original noise floor Original range (a) indoor vs. outdoor (w/o LNA) (b) with LNA vs. without LNA (indoor) Figure ... risks in wireless hotspot networks. In Security in Pervasive Computing, First International Conference (2003), pp. 10–24. [20] GRU T ESE R , M., A N D GRU NWAL D, D. Enhancing loca- tion privacy in...
Ngày tải lên: 23/03/2014, 10:20
security & quality of service in ad hoc wireless networks
... dissolving the resin covering the silicon using fuming acid. The next step involves layout reconstruction using a systema- tic combination of microscopy and invasive removal of covering layers. During layout ... routing mes- sages and advertize non-existent links, provide incorrect link state information and flood other nodes with routing traffic, thus inflicting Byzantine failures on the system. The wireless ... metric information can be inserted into legitimate protocol packets by malicious insider nodes. 3.6 Attacks against routing or network layer Attacks against routing are basically of two types: internal...
Ngày tải lên: 25/03/2014, 12:07
Bạn có muốn tìm thêm với từ khóa: