Sciweavers

629 search results - page 40 / 126
» Design of a Medium Access Control Protocol for Dynamic Spect...
Sort
View
INFOCOM
2009
IEEE
14 years 2 months ago
A Protocol-Independent Approach for Analyzing the Optimal Operation Point of CSMA/CA Protocols
Abstract—This paper presents a protocol-independent approach to reveal a new insight into the performance of carrier sense multiple access with collision avoidance (CSMA/CA) prot...
Yu Cheng, Xinhua Ling, Weihua Zhuang
SASN
2006
ACM
14 years 1 months ago
Impact of optimal MAC layer attacks on the network layer
Node misbehavior in wireless ad hoc networks leads to sudden unpredictable changes in network topology, resulting in fluctuation of traffic load and capacity for already existin...
Svetlana Radosavac, John S. Baras, George V. Moust...
ICC
1997
IEEE
155views Communications» more  ICC 1997»
14 years 5 days ago
Design of Call Control Signaling in Wireless ATM Networks
: In this paper, a multiservice, local-area, wireless access ATM system is explored from a signaling protocol viewpoint. The signaling architecture considered here follows the sign...
Nikolaos H. Loukas, Nikos I. Passas, Lazaros F. Me...
ICWN
2004
13 years 9 months ago
Sustaining Performance Under Traffic Overload
In this paper, we investigate the performance of wireless ad hoc networks with traffic loads beyond saturation. While it is desirable to operate a network below saturation, an ad h...
Saman Desilva, Rajendra V. Boppana
ECUMN
2007
Springer
14 years 2 months ago
Enforcing Access Control Using Risk Assessment
Context-based access control is an emerging approach for modeling adaptive solution, making access control management more flexible and powerful. But in the ubiquitous environment...
Nguyen Ngoc Diep, Le Xuan Hung, Yonil Zhung, Sungy...