Sciweavers

1677 search results - page 317 / 336
» Traffic Models for Wireless Communication Networks
Sort
View
ICUMT
2009
13 years 5 months ago
Simulation analysis of Bluetooth Piconets self-disturbance in industrial applications: A case study
- Wireless systems operating in the 2.4 GHz ISM frequency band and sharing the same environment in an industrial environment are likely to interfere with each other due to simultan...
Muhammad Kamran Khan, Ahmad Ali Tabassam, Farhan A...
CN
2004
122views more  CN 2004»
13 years 7 months ago
Group rekeying with limited unicast recovery
In secure group communications, a key server can deliver a "grouporiented" rekey message [22] to a large number of users efficiently using multicast. For reliable delive...
X. Brian Zhang, Simon S. Lam, Dong-Young Lee
CCS
2009
ACM
14 years 2 months ago
On non-cooperative location privacy: a game-theoretic analysis
In mobile networks, authentication is a required primitive of the majority of security protocols. However, an adversary can track the location of mobile nodes by monitoring pseudo...
Julien Freudiger, Mohammad Hossein Manshaei, Jean-...
INFOCOM
2009
IEEE
14 years 2 months ago
Power Controlled Scheduling with Consecutive Transmission Constraints: Complexity Analysis and Algorithm Design
Abstract—We study the joint power control and minimumframe-length scheduling problem in wireless networks, under the physical interference model and subject to consecutive transm...
Liqun Fu, Soung Chang Liew, Jianwei Huang
MOBICOM
2000
ACM
14 years 11 days ago
Pushing dependent data in clients-providers-servers systems
In satellite and wireless networks and in advanced traffic information systems in which the up-link bandwidth is very limited, a server broadcasts data files in a round-robin man...
Amotz Bar-Noy, Joseph Naor, Baruch Schieber