Sciweavers

128 search results - page 5 / 26
» Random Access Protocols for WLANs Based on Mechanism Design
Sort
View
JNW
2008
83views more  JNW 2008»
13 years 7 months ago
Substantiating Timing and Behavioral Anomalies in Wireless LANs Using GCL
With the increasing dependence on wireless LANs (WLANs), businesses, educational institutions and other organizations are in need of a reliable security mechanism. The latest secur...
Elankayer Sithirasenan, Vallipuram Muthukkumarasam...
JSAC
2008
112views more  JSAC 2008»
13 years 7 months ago
System Design Considerations for Undersea Networks: Link and Multiple Access Protocols
Abstract--We address several inter-related aspects of underwater network design within the context of a cross-layer approach. We first highlight the impact of key characteristics o...
Nathan Parrish, Leonard T. Tracy, Sumit Roy, Payma...
INFOCOM
2010
IEEE
13 years 6 months ago
Optimal SINR-based Random Access
— Random access protocols, such as Aloha, are commonly modeled in wireless ad-hoc networks by using the protocol model. However, it is well-known that the protocol model is not a...
Amir Hamed Mohsenian Rad, Vincent W. S. Wong, Robe...
FOCS
2002
IEEE
14 years 20 days ago
Protocols and Impossibility Results for Gossip-Based Communication Mechanisms
In recent years, gossip-based algorithms have gained prominence as a methodology for designing robust and scalable communication schemes in large distributed systems. The premise ...
David Kempe, Jon M. Kleinberg
CDC
2008
IEEE
187views Control Systems» more  CDC 2008»
14 years 2 months ago
Controlled random access MAC for network utility maximization in wireless networks
— There has been much recent interest in protocol design for wireless networks based on maximizing a network utility function. A significant advance in recent years is the obser...
Robert J. McCabe, Nikolaos M. Freris, P. R. Kumar