Sciweavers

267 search results - page 50 / 54
» The Case for Virtualized Wireless Access Networks
Sort
View
MOBIHOC
2007
ACM
14 years 7 months ago
Distributed opportunistic scheduling for ad-hoc communications: an optimal stopping approach
We consider distributed opportunistic scheduling (DOS) in wireless ad-hoc networks, where many links contend for the same channel using random access. In such networks, distribute...
Dong Zheng, Weiyan Ge, Junshan Zhang
RAID
2005
Springer
14 years 29 days ago
Sequence Number-Based MAC Address Spoof Detection
Abstract. The exponential growth in the deployment of IEEE 802.11based wireless LAN (WLAN) in enterprises and homes makes WLAN an attractive target for attackers. Attacks that expl...
Fanglu Guo, Tzi-cker Chiueh
ACSAC
2006
IEEE
14 years 1 months ago
Vulnerability Analysis of MMS User Agents
The Multimedia Messaging Service (MMS) is becoming more popular, as mobile phones integrate audio and video recording functionality. Multimedia messages are delivered to users thr...
Collin Mulliner, Giovanni Vigna
VTC
2008
IEEE
142views Communications» more  VTC 2008»
14 years 1 months ago
Fairness Assessment of the Adaptive Token Bank Fair Queuing Scheduling Algorithm
Abstract—Adaptive Token Bank Fair Queuing (ATBFQ) algorithm has been proposed as a cross-layer scheduling technique for 4G wireless systems recently. This algorithm takes higher ...
Feroz A. Bokhari, Halim Yanikomeroglu, William K. ...
WOWMOM
2006
ACM
111views Multimedia» more  WOWMOM 2006»
14 years 1 months ago
A New MAC Scheme for Very High-Speed WLANs
We consider the medium access control (MAC) layer for very high-speed Wireless LANs, which is designed to support rich multimedia applications such as highdefinition television. ...
Tianji Li, Qiang Ni, David Malone, Douglas J. Leit...