Sciweavers

13007 search results - page 2453 / 2602
» Wireless and Mobile Networking
Sort
View
INFOCOM
2009
IEEE
14 years 3 months ago
Greedy Routing with Bounded Stretch
—Greedy routing is a novel routing paradigm where messages are always forwarded to the neighbor that is closest to the destination. Our main result is a polynomial-time algorithm...
Roland Flury, Sriram V. Pemmaraju, Roger Wattenhof...
ICCCN
2008
IEEE
14 years 3 months ago
Fingerprint-Based Location Estimation with Virtual Access Points
— Location fingerprinting techniques generally make use of existing wireless network infrastructure. Consequently, the positions of the access points (APs), which constitute an ...
A. K. M. Mahtab Hossain, Hien Nguyen Van, Wee-Seng...
INFOCOM
2008
IEEE
14 years 3 months ago
A New ACK Policy To Mitigate the Effects of Coexisting IEEE 802.11/802.11e Devices
— In IEEE 802.11 wireless networks, EDCA users’ performance may be degraded because of the existence of legacy users and therefore would get a lower priority service. Such effe...
Haithem Al-Mefleh, J. Morris Chang
SEUS
2008
IEEE
14 years 3 months ago
Resolving Performance Anomaly Using ARF-Aware TCP
In this study, we propose ARF-aware TCP that resolves the performance anomaly in 802.11 WLAN networks. Performance anomaly is a network symptom that fairness among the nodes is bro...
See-hwan Yoo, Tae-Kyung Kim, Chuck Yoo
WCNC
2008
IEEE
14 years 3 months ago
Genetic Algorithm Aided Design of Near-Capacity Irregular Variable Length Codes
— In this paper we demonstrate that our ability to match the EXtrinsic Information Transfer (EXIT) function of an Irregular Variable Length Code (IrVLC) to that of a seriallyconc...
Robert G. Maunder, Lajos Hanzo
« Prev « First page 2453 / 2602 Last » Next »