Sciweavers

1297 search results - page 252 / 260
» Deploying Wireless Networks with Beeps
Sort
View
130
Voted
SIGSOFT
2007
ACM
16 years 4 months ago
CTG: a connectivity trace generator for testing the performance of opportunistic mobile systems
The testing of the performance of opportunistic communication protocols and applications is usually done through simulation as i) deployments are expensive and should be left to t...
Roberta Calegari, Mirco Musolesi, Franco Raimondi,...
144
Voted
COMCOM
2008
91views more  COMCOM 2008»
15 years 3 months ago
A WEP post-processing algorithm for a Robust 802.11 WLAN implementation
Wired Equivalent Privacy (WEP) protocol used within the IEEE 802.11 standard has "major security flaws" thus wireless local area networks (WLANs) using the protocol are ...
Taskin Koçak, Mohit Jagetia
GLOBECOM
2009
IEEE
15 years 10 months ago
Carrier to Interference Ratio Analysis for the Shotgun Cellular System
—This paper analyzes the carrier-to-interference ratio of the so-called shotgun cellular system (SCS). In the SCS, basestations are placed randomly according to a two-dimensional...
Prasanna Madhusudhanan, Juan G. Restrepo, Youjian ...
RTCSA
2009
IEEE
15 years 10 months ago
Event-Based Location Dependent Data Services in Mobile WSNs
—Mobile sensors are widely deployed in Wireless Sensor Networks (WSNs) to satisfy emerging application requirements. Specifically, processing location dependent queries in mobile...
Liang Hong, Yafeng Wu, Sang Hyuk Son, Yansheng Lu
ICC
2007
IEEE
114views Communications» more  ICC 2007»
15 years 10 months ago
A Frequency Diversity Technique for Interference Mitigation in Coexisting Bluetooth and WLAN
— Co-channel interference has become an important problem with the increasing deployment of wireless networks in the unlicensed frequency band. Most existing schemes aim to avoid...
Jingli Li, Xiangqian Liu