Sciweavers

430 search results - page 50 / 86
» Securing Layer 2 in Local Area Networks
Sort
View
CCR
2006
116views more  CCR 2006»
13 years 8 months ago
The devil and packet trace anonymization
Releasing network measurement data--including packet traces-to the research community is a virtuous activity that promotes solid research. However, in practice, releasing anonymiz...
Ruoming Pang, Mark Allman, Vern Paxson, Jason Lee
LCN
2006
IEEE
14 years 2 months ago
Achieving Fairness in IEEE 802.11 Ad Hoc Networks
IEEE 802.11 has become the main technology in local area wireless networks. However, performance anomalies, especially, in terms of fairness, arise in its use in ad hoc networks. ...
Fanilo Harivelo, Pascal Anelli
IJNM
2008
112views more  IJNM 2008»
13 years 8 months ago
How to avoid packet droppers with proactive routing protocols for ad hoc networks
Routing protocols for mobile ad hoc networks (MANETs) have been an active area of research for the last decade, with many very interesting potential as well as actual applications...
Ignacy Gawedzki, Khaldoun Al Agha
CJ
2004
99views more  CJ 2004»
13 years 7 months ago
On the Connectivity of Ad Hoc Networks
We study the effects of physical layer parameters on the connectivity of fading wireless ad-hoc networks. Relying on a symbol error rate connectivity metric for wireless ad-hoc net...
Christian Bettstetter
DSOM
2007
Springer
14 years 2 months ago
Probabilistic Fault Diagnosis Using Adaptive Probing
Past research on probing-based network monitoring provides solutions based on preplanned probing which is computationally expensive, is less accurate, and involves a large manageme...
Maitreya Natu, Adarshpal S. Sethi