Results 241 to 250 of about 625,882 (290)
Some of the next articles are maybe not open access.
Network locality in wireless networks
2013 ACS International Conference on Computer Systems and Applications (AICCSA), 2013The locality of reference is a well studied phenomenon in computer systems. As one special case, the network locality has been demonstrated to exist in the wired local area networks. Previous research suggests that the network traffic does not follow uniform distribution. In this paper, we explore the network locality in the wireless networks.
Yang Chi, Dharma P. Agrawal
openaire +1 more source
The Insecurity of Wireless Networks
IEEE Security & Privacy Magazine, 2012Wi-Fi is the standard protocol for wireless networks used extensively in US critical infrastructures. Since the Wired Equivalency Privacy (WEP) security protocol was broken, the Wi-Fi Protected Access (WPA) protocol has been considered the secure alternative compatible with hardware developed for WEP. However, in November 2008, researchers developed an
Frederick T. Sheldon +3 more
openaire +1 more source
Authentication in Wireless Networks
2007 40th Annual Hawaii International Conference on System Sciences (HICSS'07), 2007With the explosive growth in the adoption of wireless networks in the recent years, the limitations of wireless security have become a topic of wide spread concern. It is easy for hackers to enter or leave a wireless network. They can directly attack the network and inject spurious packets, tamper with packets, drop packets, or impersonate another node.
G. V. S. Raju 0001, Rehan Akbani
openaire +1 more source
The economics of wireless networks
Communications of the ACM, 2004Assessing the rapidly changing economics of the wireless industry.
Petros Nicopolitidis +3 more
openaire +1 more source
Journal of Telemedicine and Telecare, 2008
Wireless telemedicine using GSM and GPRS technologies can only provide low bandwidth connections, which makes it difficult to transmit images and video. Satellite or 3G wireless transmission provides greater bandwidth, but the running costs are high. Wireless networks (WLANs) appear promising, since they can supply high bandwidth at low cost. However,
openaire +2 more sources
Wireless telemedicine using GSM and GPRS technologies can only provide low bandwidth connections, which makes it difficult to transmit images and video. Satellite or 3G wireless transmission provides greater bandwidth, but the running costs are high. Wireless networks (WLANs) appear promising, since they can supply high bandwidth at low cost. However,
openaire +2 more sources
Network Security, 2011
The security of wifi connections has been in and out of the news over the past few years as the integrity of the wifi encryption process has been progressively eroded. Wifi encryption is normally driven by the use of three flavours of passwords/passphrases – Wired Equivalent Privacy (WEP), Wifi Protected Access (WPA) and WPA2 – which use different ...
openaire +1 more source
The security of wifi connections has been in and out of the news over the past few years as the integrity of the wifi encryption process has been progressively eroded. Wifi encryption is normally driven by the use of three flavours of passwords/passphrases – Wired Equivalent Privacy (WEP), Wifi Protected Access (WPA) and WPA2 – which use different ...
openaire +1 more source
The capacity of wireless networks
IEEE Transactions on Information Theory, 2000Summary: When \(n\) identical randomly located nodes, each capable of transmitting at \(W\) bits per second and using a fixed range, form a wireless network, the throughput \(\lambda (n)\) obtainable by each node for a randomly chosen destination is \(\Theta(W/\sqrt{(n\log n)})\) bits per second under a noninterference protocol.
Piyush Gupta, P. R. Kumar 0001
openaire +2 more sources
Scalability of Wireless Networks
IEEE/ACM Transactions on Networking, 2007This paper investigates the existence of scalable protocols that can achieve the capacity limit of c/radicN per source-destination pair in a large wireless network of N nodes when the buffer space of each node does not grow with the size of the network N.
Predrag R. Jelenkovic +2 more
openaire +2 more sources
The future of wireless networking
2012 IEEE Hot Chips 24 Symposium (HCS), 2012This article consists of a collection of slides from the author's conference presentation on the future of wireless networks. Specific topics addressed include: the major factors driving the wireless market today; where the value is for companies and service providers; and new areas of technological development in the future.
openaire +2 more sources
IEEE Network, 1997
Two network architectures for connecting fixed wireless nodes to a central concentrator-relay and star-are combined into a structured network architecture called a relay star network. A relay star network is characterized by the property that there is a unique communication path between any two nodes; that is, the graph of the network is a rooted tree.
openaire +1 more source
Two network architectures for connecting fixed wireless nodes to a central concentrator-relay and star-are combined into a structured network architecture called a relay star network. A relay star network is characterized by the property that there is a unique communication path between any two nodes; that is, the graph of the network is a rooted tree.
openaire +1 more source

