Sciweavers

151 search results - page 27 / 31
» Packet Reversed Packet Combining Scheme
Sort
View
IAJIT
2008
139views more  IAJIT 2008»
13 years 9 months ago
Internet Connectivity for Mobile Ad Hoc Networks Using Hybrid Adaptive Mobile Agent Protocol
: Internet-based Mobile Ad Hoc Networking (MANET) is an emerging technology that supports self-organizing mobile networking infrastructures. This is expected to be of great use in ...
Velmurugan Ayyadurai, Rajaram Ramasamy
JSAC
2006
172views more  JSAC 2006»
13 years 9 months ago
A Memory-Efficient Parallel String Matching Architecture for High-Speed Intrusion Detection
The ability to inspect both packet headers and payloads to identify attack signatures makes network intrusion detection system (NIDS) a promising approach to protect Internet syste...
Hongbin Lu, Kai Zheng, Bin Liu, Xin Zhang, Y. Liu
TWC
2008
112views more  TWC 2008»
13 years 9 months ago
Design and Analysis of Cross-Layer Tree Algorithms for Wireless Random Access
In this paper, we develop a random access scheme which combines the widely used binary exponential backoff (BEB) algorithm with a cross-layer tree algorithm (TA) that relies on suc...
Xin Wang, Yingqun Yu, Georgios B. Giannakis
LCN
2008
IEEE
14 years 4 months ago
Speedo: Realistic achievable bandwidth in 802.11 through passive monitoring
—End to end available bandwidth is often constrained by IEEE 802.11 hops in the access network. Available bandwidth measurement is particularly challenging in the wireless enviro...
Malik Ahmad Yar Khan, Darryl Veitch
ICUMT
2009
13 years 7 months ago
Performance of relay-enabled uplink in cellular networks - a flow level analysis
Uplink users in cellular networks, such as UMTS/ HSPA, located at the edge of the cell generally suffer from poor channel conditions. Deploying intermediate relay nodes is seen as ...
Desislava C. Dimitrova, Hans van den Berg, Geert J...