Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Search
  Browse All Reviews > Computer Systems Organization (C) > Computer-Communication Networks (C.2) > Local and Wide-Area Networks (C.2.5) > Access Schemes (C.2.5...)  
 
Options:
 
  1-10 of 20 Reviews about "Access Schemes (C.2.5...)": Date Reviewed
  A survey of techniques for remote access to home networks and resources
Belimpasakis P., Stirbu V. Multimedia Tools and Applications 70(3): 1899-1939, 2014.  Type: Article

This paper was first published online two years ago (in 2012). The development and deployment of home networks supported by the boom of gradually higher capacity broadband Internet access have been extensive, hence the survey should no...

Oct 14 2014
  Delay aware link scheduling for multi-hop TDMA wireless networks
Djukic P., Valaee S. IEEE/ACM Transactions on Networking 17(3): 870-883, 2009.  Type: Article

This paper proposes an efficient method to compute minimum delay schedules over multi-hop wireless networks that use time-division multiple access (TDMA)-based media access control protocols. Simulation results are also presented....

Mar 23 2010
  A cross-layer approach to channel assignment in wireless ad hoc networks
Gong M., Midkiff S., Mao S. Mobile Networks and Applications 12(1): 43-56, 2007.  Type: Article

With the fast development of wireless applications, the need for an optimized design of supporting networks steadily increases. One problem concerns efficient channel assignment, which is subject to collision and interference constrain...

Nov 7 2007
  A negotiation scheme for access rights establishment in autonomic communication
Koshutanski H., Massacci F. Journal of Network and Systems Management 15(1): 117-136, 2007.  Type: Article

In autonomic communications, each node independently manages and enforces its own security policies. An autonomous client must somehow negotiate credentials with an autonomous server in order to gain access to authorized resources. Thi...

Oct 11 2007
  QoS aware multi-channel scheduling for IEEE 802.15.3 networks
Rangnekar A., Sivalingam K. Mobile Networks and Applications 11(1): 47-62, 2006.  Type: Article

Rangnekar and Sivalingam report on a study of wireless networks, and assert that it is an extension of studies of multiple transmission channels in the context of IEEE 802.11, and that the work is the first systematic study of media ac...

Aug 21 2007
  Cisco network admission control, volume II: NAC deployment and troubleshooting (Networking Technology)
Frahim J., Santos O., White D., Cisco Press, 2006. 624 pp.  Type: Book (9781587052255)

Securing modern networks involves more than protection from external threats. Today, internal network control is one of corporate information technology’s (IT’s) greatest challenges. One key aspect of this problem i...

Aug 17 2007
  A practical cross-layer mechanism for fairness in 802.11 networks
Dunn J., Neufeld M., Sheth A., Grunwald D., Bennett J. Mobile Networks and Applications 11(1): 37-45, 2006.  Type: Article

The wireless media access control (MAC) protocol for 802.11 networks has long been a subject of research. Current protocols allow multiple data rates on a single wireless local area network (LAN). However, the point of allowing multipl...

Sep 14 2006
  Fair distributed congestion control in multirate multicast networks
Sarkar S., Tassiulas L. IEEE/ACM Transactions on Networking 13(1): 121-133, 2005.  Type: Article

This paper discusses a distributed maxmin fair rate algorithm for multicast service over a network in the case of infinitely divisible bandwidth allocations. The authors mention that typical combinatorial (nondeterministic polynomial-t...

Jan 20 2006
  Defending against distributed denial-of-service attacks with max-min fair server-centric router throttles
Yau D., Lui J., Liang F., Yam Y. IEEE/ACM Transactions on Networking 13(1): 29-42, 2005.  Type: Article

A distributed denial of service (DDoS) attack occurs when malicious hosts overwhelm a victim server by directing an excessive volume of traffic to it. The authors present a server-centric router throttling approach for protecting a ser...

Jun 10 2005
  URSA: ubiquitous and robust access control for mobile ad hoc networks
Luo H., Kong J., Zerfos P., Lu S., Zhang L. IEEE/ACM Transactions on Networking 12(6): 1049-1063, 2004.  Type: Article

This is a fascinating paper, which discusses access services for large infrastructureless wireless networks, specifically those with access at the network layer. Poorly behaving nodes that are either selfish or malicious are addressed....

Apr 12 2005
 
 
 
Display per page
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy