Sciweavers

5252 search results - page 942 / 1051
» Logic in Access Control
Sort
View
TCOM
2010
107views more  TCOM 2010»
15 years 2 months ago
A Simple Recruitment Scheme of Multiple Nodes for Cooperative MAC
—Physical (PHY) layer cooperation in a wireless network allows neighboring nodes to share their communication resources in order to create a virtual antenna array by means of dis...
Francesco Verde, Thanasis Korakis, Elza Erkip, Ann...
191
Voted
WINET
2010
180views more  WINET 2010»
15 years 2 months ago
An analytical model for performance evaluation of multimedia applications over EDCA in an IEEE 802.11e WLAN
—We extend the modeling heuristic of [1] to evaluate the performance of an IEEE 802.11e infrastructure network carrying packet telephone calls, streaming video sessions and TCP c...
Sri Harsha, Anurag Kumar, Vinod Sharma
WINET
2010
105views more  WINET 2010»
15 years 2 months ago
Flow rank based probabilistic fair scheduling for wireless ad hoc networks
Fair scheduling is an ideal candidate for fair bandwidth sharing and thereby achieving fairness among the contending flows in a network. It is particularly challenging for ad hoc ...
Md. Mamun-Or-Rashid, Muhammad Mahbub Alam, Md. Abd...
ANCS
2010
ACM
15 years 1 months ago
A new TCB cache to efficiently manage TCP sessions for web servers
TCP/IP, the most commonly used network protocol, consumes a significant portion of time in Internet servers. While a wide spectrum of studies has been done to reduce its processin...
Guangdeng Liao, Laxmi N. Bhuyan, Wei Wu, Heeyeol Y...
GLOBECOM
2010
IEEE
15 years 1 months ago
Constructing Secure Localization Systems with Adjustable Granularity Using Commodity Hardware
Proof of a user's identity is not always a sufficient means for making an authorization decision. In an increasing set of circumstances, knowledge of physical location provide...
Patrick Traynor, Joshua Schiffman, Thomas F. La Po...