Sciweavers

430 search results - page 63 / 86
» Securing Layer 2 in Local Area Networks
Sort
View
AICT
2009
IEEE
172views Communications» more  AICT 2009»
14 years 2 months ago
A Practical Characterization of 802.11 Access Points in Paris
Unlike other wireless technologies, the deployment of 802.11 networks is not limited to operators: access points can easily be installed by end-users for domestic use. This singul...
Guillaume Valadon, Florian Le Goff, Christophe Ber...
ICC
2007
IEEE
124views Communications» more  ICC 2007»
14 years 2 months ago
Emulating End-to-End Losses and Delays for Ad Hoc Networks
— Ad hoc networks have gained place in the research area recently. There are many researches regarding different topics related to such networks, such as routing, media access co...
Alaa Seddik-Ghaleb, Yacine Ghamri-Doudane, Sidi-Mo...
WINE
2005
Springer
161views Economy» more  WINE 2005»
14 years 1 months ago
Design of Incentive Compatible Mechanisms for Stackelberg Problems
This paper takes the first steps towards designing incentive compatible mechanisms for hierarchical decision making problems involving selfish agents. We call these Stackelberg p...
Dinesh Garg, Yadati Narahari
ICNP
2009
IEEE
14 years 2 months ago
CUBS: Coordinated Upload Bandwidth Sharing in Residential Networks
— Millions of residential users are widely served by cable or DSL connections with modest upload bandwidth and relatively high download bandwidth. For the increasingly important ...
Enhua Tan, Lei Guo, Songqing Chen, Xiaodong Zhang
CCR
2007
135views more  CCR 2007»
13 years 8 months ago
Future internet: fundamentals and measurement
While the Internet is hardly “broken”, it has proved unable to integrate new ideas, new architectures, and provide paths for future integration of data, voice, rich media and ...
Thrasyvoulos Spyropoulos, Serge Fdida, Scott Kirkp...