Sciweavers

212 search results - page 26 / 43
» CloudPolice: taking access control out of the network
Sort
View
WOWMOM
2005
ACM
130views Multimedia» more  WOWMOM 2005»
14 years 2 months ago
PARMA: A PHY/MAC Aware Routing Metric for Ad-Hoc Wireless Networks with Multi-Rate Radios
Ad-hoc wireless networks with multi-rate radios (such as 802.11a, b, g) require a new class of MAC/PHY aware metrics that take into account factors such as physical-layer link spe...
Suli Zhao, Zhibin Wu, Arup Acharya, Dipankar Raych...
CISS
2008
IEEE
14 years 3 months ago
Network distribution capacity and content-pipe gap
Abstract— The growth of video content and diversification of content-sharing methods in the Internet lead to an exciting range of new problems in networking, communications, and...
Mung Chiang
SP
1997
IEEE
135views Security Privacy» more  SP 1997»
14 years 1 months ago
Analysis of a Denial of Service Attack on TCP
This paper analyzes a network-baseddenial of service attack for IP (Internet Protocol) based networks. It is popularly called SYN flooding. It works by an attacker sending many T...
Christoph L. Schuba, Ivan Krsul, Markus G. Kuhn, E...
LCN
1999
IEEE
14 years 1 months ago
Measured Performance of the IEEE 802.11 Wireless LAN
The practical network performances of two commercial IEEE 802.11 compliant wireless local area networks (WLANs) are measured at the medium access control sublayer. A number of tes...
Benny Bing
SUTC
2010
IEEE
14 years 27 days ago
Pushing the Throughput Limit of Low-Complexity Wireless Embedded Sensing Systems
—To maximize the communication throughput for wireless sensing systems, designers have attempted various combinations of protocol design and manual code optimization. Although th...
Vahid Salmani, Pai H. Chou