Sciweavers

2699 search results - page 448 / 540
» On Evaluating the Performance of Security Protocols
Sort
View
MMB
2010
Springer
182views Communications» more  MMB 2010»
13 years 11 months ago
CrossTrace: Cross-Layer Measurement for IEEE 802.11 Wireless Testbeds
In this paper, we introduce and evaluate CrossTrace, a framework for performing cross-layer measurements in IEEE 802.11 based wireless networks. CrossTrace allows tracing of parame...
Simon Frohn, Sascha Gübner, Christoph Lindema...
WCNC
2010
IEEE
13 years 11 months ago
Optimal Tradeoff Between Transmission Rate and Packet Duration in Wireless Ad Hoc Networks
—This paper considers the tradeoff between bursty and continuous transmissions in wireless ad hoc networks. In our network model, packets belonging to specific transmitters arri...
Jon E. Corneliussen, Mariam Kaynia, Geir E. &Oslas...
MASCOTS
2001
13 years 9 months ago
Parameterized Mobile Action Generator for a Wireless PCS Network
While there are different research groups in the mobile computing community, most research requires mobile action data in terms of user calling and mobility patterns. Since collec...
Sang-Eon Park, Carla N. Purdy
PRL
2006
180views more  PRL 2006»
13 years 7 months ago
MutualBoost learning for selecting Gabor features for face recognition
This paper describes an improved boosting algorithm, the MutualBoost algorithm, and its application in developing a fast and robust Gabor feature based face recognition system. Th...
LinLin Shen, Li Bai
TSP
2010
13 years 2 months ago
Statistical detection of congestion in routers
Detection of congestion plays a key role in numerous networking protocols, including those driving Active Queue Management (AQM) methods used in congestion control in Internet rout...
Ivan D. Barrera, Stephan Bohacek, Gonzalo R. Arce