Sciweavers

BROADNETS
2007
IEEE
14 years 5 months ago
Improving VoIP call capacity over IEEE 802.11 networks
— The expected VoIP call capacity in a one hop IEEE 802.11b network with G.711 voice codec is about 85 simultaneous calls, but the actual observed capacity is only 5 calls even a...
Yeonsik Jeong, Sandeep Kakumanu, Cheng-Lin Tsao, R...
BROADNETS
2007
IEEE
14 years 5 months ago
Joint monitoring and routing in wireless sensor networks using robust identifying codes
Wireless Sensor Networks (WSNs) provide an important means of monitoring the physical world, but their ons present challenges to fundamental network services such as routing. In t...
Moshe Laifenfeld, Ari Trachtenberg, Reuven Cohen, ...
BROADNETS
2007
IEEE
14 years 5 months ago
Client-side web acceleration for low-bandwidth hosts
—Current popular web-browsers simply fetch the entire web-page from the server in a greedy fashion. This simple web fetching mechanism employed by browsers is inappropriate for u...
Tae-Young Chang, Zhenyun Zhuang, Aravind Velayutha...
BROADNETS
2007
IEEE
14 years 5 months ago
On supporting high quality 3D geometry multicasting over IEEE 802.11 wireless networks
—With significant improvements in both wireless technologies and computational capabilities of mobile devices, it is now possible to exchange and render 3D graphics over wireless...
Hui Li, Ming Li, B. Prabhakaran
BROADNETS
2007
IEEE
14 years 5 months ago
Modeling and generating TCP application workloads
Abstract — In order to perform valid experiments, traffic generators used in network simulators and testbeds require up to date models of traffic as it exists on real network lin...
Félix Hernández-Campos, Kevin Jeffay...
BROADNETS
2007
IEEE
14 years 5 months ago
Wireless traffic: The failure of CBR modeling
Stefan Karpinski, Elizabeth M. Belding, Kevin C. A...
BROADNETS
2007
IEEE
14 years 5 months ago
Detecting protected layer-3 rogue APs
— Unauthorized rogue access points (APs), such as those brought into a corporate campus by employees, pose a security threat as they may be poorly managed or insufficiently secu...
Hongda Yin, Guanling Chen, Jie Wang
BROADNETS
2007
IEEE
14 years 5 months ago
Reduced flow routing: Leveraging residual capacity to reduce blocking in GMPLS networks
— Traffic engineering has been extensively studied to maximize network resource utilization while minimizing call blocking [1]. As the the demand for high data rate services ove...
Xiaolan J. Zhang, Sun-il Kim, Steven S. Lumetta
BROADNETS
2007
IEEE
14 years 5 months ago
Pricing spectrum access in cellular CDMA networks with heterogeneous demand
—We consider pricing secondary access to wireless spectrum in cellular CDMA networks. We study the case for a primary license holder interested in leasing the right of providing ...
Ashraf Al Daoud, Murat Alanyali, David Starobinski
BROADNETS
2007
IEEE
14 years 5 months ago
Assessing discreet packet-dropping attacks using nearest-neighbor and path-vector attribution
— A Mobile Ad-Hoc Network (MANET) is considered with nodes that may act selfishly or maliciously by simply dropping data packets rather than forwarding them. We study a distribu...
Arnab Das 0002, George Kesidis, Venkat Pothamsetty