Sciweavers

5493 search results - page 868 / 1099
» Effectively Polynomial Simulations
Sort
View
130
Voted
JNW
2006
111views more  JNW 2006»
15 years 3 months ago
A Novel AP for Improving the Performance of Wireless LANs Supporting VoIP
Recently, wireless LANs based on the IEEE 802.11 standard have become popular and widely used, and Voice-over-IP (VoIP) is one of the most promising technologies to be used in mobi...
Thavisak Manodham, Tetsuya Miki
117
Voted
JPDC
2006
93views more  JPDC 2006»
15 years 3 months ago
Fault-tolerant multicasting in hypercubes using local safety information
A fully unsafe hypercube according to the global safety can be split into a unique set of maximal safe subcubes. Multicasting in a maximal safe subcube can be completed reliably b...
Dong Xiang, Ai Chen, Jia-Guang Sun
142
Voted
JPDC
2006
87views more  JPDC 2006»
15 years 3 months ago
Honeypot back-propagation for mitigating spoofing distributed Denial-of-Service attacks
Any packet destined to a honeypot machine (that is, a decoy server machine) is most probably an attack packet. We propose honeypot back-propagation, a scheme that traces attack pa...
Sherif M. Khattab, Rami G. Melhem, Daniel Moss&eac...
128
Voted
JSAC
2006
83views more  JSAC 2006»
15 years 3 months ago
Optimal ACK mechanisms of the IEEE 802.15.3 MAC for ultra-wideband systems
Ultra-wideband (UWB) transmission is an emerging wireless technology for future short-range indoor and outdoor multimedia applications. To coordinate the access to the wireless med...
Yang Xiao, Xuemin Shen, Hai Jiang
133
Voted
JSAC
2006
97views more  JSAC 2006»
15 years 3 months ago
Distributed Turbo Coding With Soft Information Relaying in Multihop Relay Networks
It has been shown that distributed turbo coding (DTC) can approach the capacity of a wireless relay network. In the existing DTC schemes, it is usually assumed that error-free deco...
Yonghui Li, Branka Vucetic, Tan F. Wong, Mischa Do...