Sciweavers

215 search results - page 23 / 43
» On Access Point Selection in IEEE 802.11 Wireless Local Area...
Sort
View
ADHOC
2005
84views more  ADHOC 2005»
13 years 8 months ago
Infrastructure-based MAC in wireless mobile ad-hoc networks
- The IEEE 802.11 standard is the most popular Medium Access Control (MAC) protocol for wireless local area networks. However, in an ad-hoc environment, the Point Coordination Func...
Hossam S. Hassanein, Tiantong You, Hussein T. Mouf...
ICC
2007
IEEE
103views Communications» more  ICC 2007»
14 years 2 months ago
On the Relay-Based Coverage Extension for Non-Conventional Multi-Hop Wireless Networks
Abstract— Due to the rapid growth of personal communications, it is now believed that multi-hop topologies will certainly play a key role in forthcoming wireless communications s...
Ramón Agüero, Johnny Choque, Luis Mu&n...
ICASSP
2008
IEEE
14 years 3 months ago
Optimal stochastic dual resource allocation for cognitive radios based on quantized CSI
The present paper deals with dynamic resource management based on quantized channel state information (CSI) for multi-carrier cognitive radio networks comprising primary and secon...
Antonio G. Marqués, Xin Wang, Georgios B. G...
ICMB
2005
IEEE
79views Business» more  ICMB 2005»
14 years 2 months ago
Identity Management in Vertical Handovers for UMTS-WLAN Networks
One motivation of mobile Next-Generation Networks (NGN) is the ubiquitous computing abilities, which provide automatic handovers for any moving computing devices in a globally net...
Mo Li, Kumbesan Sandrasegaran, Xiaoan Huang
WS
2006
ACM
14 years 2 months ago
Detecting identity-based attacks in wireless networks using signalprints
Wireless networks are vulnerable to many identity-based attacks in which a malicious device uses forged MAC addresses to masquerade as a specific client or to create multiple ill...
Daniel B. Faria, David R. Cheriton