Sciweavers

92 search results - page 16 / 19
» Validating Wireless Protocol Conformance Test Cases
Sort
View
ICC
2007
IEEE
170views Communications» more  ICC 2007»
14 years 1 months ago
Evaluating Techniques for Network Layer Independence in Cognitive Networks
— Cognitive networks are the latest progression of cognitive functionality into the networking stack, an effort which began with a layer one and two focus on cognitive radios, an...
Muthukumaran Pitchaimani, Benjamin J. Ewy, Joseph ...
COMPSAC
2006
IEEE
14 years 1 months ago
Testability of Software in Service-Oriented Architecture
Service-Oriented Architecture (SOA) is a system architecture in which a collection of loosely coupled services communicate with each other using standard interfaces and message-ex...
Wei-Tek Tsai, Jerry Gao, Xiao Wei, Yinong Chen
TMC
2008
112views more  TMC 2008»
13 years 7 months ago
Throughput Analysis and Measurements in IEEE 802.11 WLANs with TCP and UDP Traffic Flows
There is a vast literature on the throughput analysis of the IEEE 802.11 media access control (MAC) protocol. However, very little has been done on investigating the interplay betw...
Raffaele Bruno, Marco Conti, Enrico Gregori
PERCOM
2009
ACM
14 years 2 months ago
Distributed Policy Resolution Through Negotiation in Ubiquitous Computing Environments
—Ensuring spontaneous ad hoc interoperation in decentralized ubiquitous computing environments is challenging, because of heterogeneous resources and divergent policies. Centrali...
Venkatraman Ramakrishna, Peter L. Reiher, Leonard ...
IJNSEC
2006
134views more  IJNSEC 2006»
13 years 7 months ago
Physical Security Perimeters for Wireless Local Area Networks
On a wired network, physical authentication is implicitly provided by access: if a user is able to plug a cable into a network socket, he must have cleared other security checks s...
Vishal Bhargava, Mihail L. Sichitiu