Sciweavers

2211 search results - page 324 / 443
» Robustness of Model-Based Simulations
Sort
View
ICC
2007
IEEE
114views Communications» more  ICC 2007»
14 years 3 months ago
A Frequency Diversity Technique for Interference Mitigation in Coexisting Bluetooth and WLAN
— Co-channel interference has become an important problem with the increasing deployment of wireless networks in the unlicensed frequency band. Most existing schemes aim to avoid...
Jingli Li, Xiangqian Liu
ICC
2007
IEEE
133views Communications» more  ICC 2007»
14 years 3 months ago
Impact of Interference and Medium Access Control on Flow Allocation in Multi-Hop Wireless Networks
—The interaction between MAC protocols and interference in wireless multi-hop networks introduces extra constraints on achievable flow rates. In this paper, we formulate an optim...
Kun-da Wu, Wanjiun Liao
ICC
2007
IEEE
112views Communications» more  ICC 2007»
14 years 3 months ago
Cross-layer Design and Analysis of Wireless Profiled TCP for Vertical Handover
Abstract - In this paper, we consider downward and upward vertical handovers in integrated wireless LAN and cellular networks, and address Wireless Profiled TCP premature timeouts ...
Humphrey Rutagemwa, Sangheon Pack, Xuemin Shen, Jo...
ICC
2007
IEEE
137views Communications» more  ICC 2007»
14 years 3 months ago
Stabilizing RED using a Fuzzy Controller
—Active Queue Management (AQM) is an effective method to provide an early notification of network congestion by pro-actively dropping or marking packets. In this paper, we propo...
Jinsheng Sun, Moshe Zukerman, Marimuthu Palaniswam...
ICPP
2007
IEEE
14 years 3 months ago
Defending P2Ps from Overlay Flooding-based DDoS
A flooding-based search mechanism is often used in unstructured P2P systems. Although a flooding-based search mechanism is simple and easy to implement, it is vulnerable to overla...
Yunhao Liu, Xiaomei Liu, Chen Wang, Li Xiao