Sciweavers

1482 search results - page 54 / 297
» Wireless LAN Security
Sort
View
AUSFORENSICS
2004
13 years 11 months ago
Implementing network defence using deception in a wireless honeypot
The advance of 802.11b wireless networking has been beset by inherent and in-built security problems. Network security tools that are freely available may intercept network transm...
Suen Yek
AINA
2008
IEEE
14 years 4 months ago
A Multi-Purpose Wireless Network Emulator: QOMET
In this paper we present the design and usage of the multi-purpose wireless network emulator that we develop, QOMET. QOMET implements a two-stage scenario-driven approach to wirel...
Razvan Beuran, Junya Nakata, Takashi Okada, Lan Ti...
WWW
2003
ACM
14 years 10 months ago
Web browsing performance of wireless thin-client computing
Web applications are becoming increasingly popular for mobile wireless systems. However, wireless networks can have high packet loss rates, which can degrade web browsing performa...
S. Jae Yang, Jason Nieh, Shilpa Krishnappa, Aparna...
WWIC
2004
Springer
123views Communications» more  WWIC 2004»
14 years 3 months ago
Experimental Analysis of Heterogeneous Wireless Networks
Packet loss and delay in Internet degrade the quality of requested services like VoIP (Voice over IP) or Video Streaming. In novel network scenarios where wired and wireless connec...
Giulio Iannello, Antonio Pescapè, Giorgio V...
CORR
2012
Springer
198views Education» more  CORR 2012»
12 years 5 months ago
Token-DCF: An Opportunistic MAC protocol for Wireless Networks
—IEEE 802.11 DCF is the MAC protocol currently used in wireless LANs. 802.11 DCF is inefficient due to two types of overhead; channel idle time and collision time. This paper pr...
Ghazale Hosseinabadi, Nitin H. Vaidya