Sciweavers

MSWIM
2005
ACM
14 years 6 months ago
A controlled-access scheduling mechanism for QoS provisioning in IEEE 802.11e wireless LANs
Wireless Local Area Networks (WLAN) are being deployed at a rapid pace and in different environments. As a result, the demand for supporting a diverse range of applications over w...
Yaser Pourmohammadi Fallah, Hussein M. Alnuweiri
MSWIM
2005
ACM
14 years 6 months ago
Fast pre-authentication based on proactive key distribution for 802.11 infrastructure networks
Recently, user mobility in wireless data networks is increasing because of the popularity of portable devices and the desire for voice and multimedia applications. These applicati...
Mohamed Kassab, Abdelfattah Belghith, Jean-Marie B...
MSWIM
2005
ACM
14 years 6 months ago
Performance analysis of differentiated ARQ scheme for video transmission over wireless networks
The Advance in video coding and wireless communication techniques has enabled video-based services to be the most important component of many emerging multimedia applications. The...
Fen Hou, Pin-Han Ho, Yongbing Zhang
MSWIM
2005
ACM
14 years 6 months ago
Experimental comparisons between SAODV and AODV routing protocols
There have been various secure routing protocols proposed for mobile ad hoc networks. Most of these protocols are analyzed by two standard techniques: simulation and security anal...
Yuxia Lin, Amir Hamed Mohsenian Rad, Vincent W. S....
MSWIM
2005
ACM
14 years 6 months ago
The optimal choice of encoding parameters for MPEG-4 AAC streamed over wireless networks
This paper addresses a novel linear programming based approach to optimize the choice of the encoding parameters for the MPEG-4 AAC audio codec. Current techniques solve the encod...
Claus Bauer
MSWIM
2005
ACM
14 years 6 months ago
Performance analysis of the intertwined effects between network layers for 802.11g transmissions
While the canonical behavior of today’s home Internet users involves several residents concurrently executing diverse Internet applications, the most common home configuration ...
Jon Gretarsson, Feng Li, Mingzhe Li, Ashish Samant...
MSWIM
2005
ACM
14 years 6 months ago
Balancing auditability and privacy in vehicular networks
We investigate how to obtain a balance between privacy and audit requirements in vehicular networks. Challenging the current trend of relying on asymmetric primitives within VANET...
Jong Youl Choi, Markus Jakobsson, Susanne Wetzel
MSWIM
2005
ACM
14 years 6 months ago
Decentralized intrusion detection in wireless sensor networks
Wireless sensor networks (WSNs) have many potential applications. Furthermore, in many scenarios WSNs are of interest to adversaries and they become susceptible to some types of a...
Ana Paula R. da Silva, Marcelo H. T. Martins, Brun...
MSWIM
2005
ACM
14 years 6 months ago
A swarm intelligent multi-path routing for multimedia traffic over mobile ad hoc networks
In the last few years, the advance of multimedia applications has prompted researchers to undertake the task of routing multimedia data through Manet. This task is rather difficul...
Saida Ziane, Abdelhamid Mellouk
MSWIM
2005
ACM
14 years 6 months ago
Towards resilient geographic routing in WSNs
In this paper, we consider the security of geographical forwarding (GF) – a class of algorithms widely used in ad hoc and sensor networks. In GF, neighbors exchange their locati...
Nael B. Abu-Ghazaleh, Kyoung-Don Kang, Ke Liu