Sciweavers

430 search results - page 47 / 86
» Securing Layer 2 in Local Area Networks
Sort
View
ICCCN
2007
IEEE
14 years 2 months ago
Outage Analysis of a University Campus Network
—Understanding outage and failure characteristics of a network is important to assess the availability of the network, determine failure source for trouble-shooting, and identify...
Baek-Young Choi, Sejun Song, George Koffler, Deep ...
SENSYS
2003
ACM
14 years 1 months ago
Differentiated surveillance for sensor networks
For many sensor network applications such as military surveillance, it is necessary to provide full sensing coverage to a security-sensitive area while at the same time minimizing...
Ting Yan, Tian He, John A. Stankovic
SIROCCO
2007
13 years 9 months ago
Local Edge Colouring of Yao-Like Subgraphs of Unit Disk Graphs
The focus of the present paper is on providing a local deterministic algorithm for colouring the edges of Yao-like subgraphs of Unit Disc Graphs. These are geometric graphs such t...
Jurek Czyzowicz, Stefan Dobrev, Evangelos Kranakis...
ICCCN
2007
IEEE
14 years 2 months ago
k-hop Backbone Formation in Ad Hoc Networks
—Several recent research activities have started to recognize the relevant role of k-hop clustering in Mobile Ad hoc NETworks (MANET) to effectively support many relevant tasks, ...
Paolo Bellavista, Eugenio Magistretti
IWCMC
2006
ACM
14 years 2 months ago
Voice capacity under quality constraints for IEEE 802.11a based WLANs
The communication of voice over wireless local area networks (WLANs) is influenced by the choice of speech codec, packetization interval and PHY layer bit rates. These choices aï...
Niranjan Shetty, Sayantan Choudhury, Jerry D. Gibs...