Sciweavers

430 search results - page 13 / 86
» Securing Layer 2 in Local Area Networks
Sort
View
MOBIHOC
2005
ACM
14 years 7 months ago
Sextant: a unified node and event localization framework using non-convex constraints
Determining node and event locations is a canonical task for many wireless network applications. Yet dedicated infrastructure for determining position information is expensive, en...
Emin Gün Sirer, Rohan Murty, Saikat Guha
ICC
2007
IEEE
106views Communications» more  ICC 2007»
14 years 2 months ago
Saturation Throughput Analysis of the 802.11e Enhanced Distributed Channel Access Function
Abstract— The IEEE 802.11e standard has recently been ratified. This standard provides Quality-of-Service (QoS) guarantees in the Medium Access Control (MAC) layer of 802.11 Wir...
Inanc Inan, Feyza Keceli, Ender Ayanoglu
WECWIS
2003
IEEE
205views ECommerce» more  WECWIS 2003»
14 years 1 months ago
Beyond "web of trust": Enabling P2P E-commerce
The huge success of eBay has proven the demand for customer-to-customer (C2C) electronic commerce. eBay is a centralized infrastructure with all its scalability problems (network ...
Anwitaman Datta, Manfred Hauswirth, Karl Aberer
ACSAC
2003
IEEE
14 years 1 months ago
Poly2 Paradigm: A Secure Network Service Architecture
General-purpose operating systems provide a rich computing environment both to the user and the attacker. The declining cost of hardware and the growing security concerns of softw...
Eric Bryant, James P. Early, Rajeev Gopalakrishna,...
ICC
2007
IEEE
187views Communications» more  ICC 2007»
14 years 2 months ago
Scalable Video Transmission over the IEEE 802.11e Networks Using Cross-Layer Rate Control
— This paper presents a novel cross-layer rate control scheme for optimizing 3D wavelet scalable video transmission over the IEEE 802.11e wireless local area networks. The propos...
Chuan Heng Foh, Yu Zhang, Zefeng Ni, Jianfei Cai