|
Browse All Reviews > Computer Systems Organization (C) > Computer-Communication Networks (C.2) > Local and Wide-Area Networks (C.2.5) > Access Schemes (C.2.5...)
|
|
|
|
|
|
|
|
|
1-10 of 20
Reviews about "Access Schemes (C.2.5...)":
|
Date Reviewed |
|
A survey of techniques for remote access to home networks and resources Belimpasakis P., Stirbu V. Multimedia Tools and Applications 70(3): 1899-1939, 2014. Type: Article
This paper was first published online two years ago (in 2012). The development and deployment of home networks supported by the boom of gradually higher capacity broadband Internet access have been extensive, hence the survey should no...
|
Oct 14 2014 |
|
Delay aware link scheduling for multi-hop TDMA wireless networks Djukic P., Valaee S. IEEE/ACM Transactions on Networking 17(3): 870-883, 2009. Type: Article
This paper proposes an efficient method to compute minimum delay schedules over multi-hop wireless networks that use time-division multiple access (TDMA)-based media access control protocols. Simulation results are also presented....
|
Mar 23 2010 |
|
A cross-layer approach to channel assignment in wireless ad hoc networks Gong M., Midkiff S., Mao S. Mobile Networks and Applications 12(1): 43-56, 2007. Type: Article
With the fast development of wireless applications, the need for an optimized design of supporting networks steadily increases. One problem concerns efficient channel assignment, which is subject to collision and interference constrain...
|
Nov 7 2007 |
|
A negotiation scheme for access rights establishment in autonomic communication Koshutanski H., Massacci F. Journal of Network and Systems Management 15(1): 117-136, 2007. Type: Article
In autonomic communications, each node independently manages and enforces its own security policies. An autonomous client must somehow negotiate credentials with an autonomous server in order to gain access to authorized resources. Thi...
|
Oct 11 2007 |
|
QoS aware multi-channel scheduling for IEEE 802.15.3 networks Rangnekar A., Sivalingam K. Mobile Networks and Applications 11(1): 47-62, 2006. Type: Article
Rangnekar and Sivalingam report on a study of wireless networks, and assert that it is an extension of studies of multiple transmission channels in the context of IEEE 802.11, and that the work is the first systematic study of media ac...
|
Aug 21 2007 |
|
Cisco network admission control, volume II: NAC deployment and troubleshooting (Networking Technology) Frahim J., Santos O., White D., Cisco Press, 2006. 624 pp. Type: Book (9781587052255)
Securing modern networks involves more than protection from external threats. Today, internal network control is one of corporate information technology’s (IT’s) greatest challenges. One key aspect of this problem i...
|
Aug 17 2007 |
|
A practical cross-layer mechanism for fairness in 802.11 networks Dunn J., Neufeld M., Sheth A., Grunwald D., Bennett J. Mobile Networks and Applications 11(1): 37-45, 2006. Type: Article
The wireless media access control (MAC) protocol for 802.11 networks has long been a subject of research. Current protocols allow multiple data rates on a single wireless local area network (LAN). However, the point of allowing multipl...
|
Sep 14 2006 |
|
Fair distributed congestion control in multirate multicast networks Sarkar S., Tassiulas L. IEEE/ACM Transactions on Networking 13(1): 121-133, 2005. Type: Article
This paper discusses a distributed maxmin fair rate algorithm for multicast service over a network in the case of infinitely divisible bandwidth allocations. The authors mention that typical combinatorial (nondeterministic polynomial-t...
|
Jan 20 2006 |
|
Defending against distributed denial-of-service attacks with max-min fair server-centric router throttles Yau D., Lui J., Liang F., Yam Y. IEEE/ACM Transactions on Networking 13(1): 29-42, 2005. Type: Article
A distributed denial of service (DDoS) attack occurs when malicious hosts overwhelm a victim server by directing an excessive volume of traffic to it. The authors present a server-centric router throttling approach for protecting a ser...
|
Jun 10 2005 |
|
URSA: ubiquitous and robust access control for mobile ad hoc networks Luo H., Kong J., Zerfos P., Lu S., Zhang L. IEEE/ACM Transactions on Networking 12(6): 1049-1063, 2004. Type: Article
This is a fascinating paper, which discusses access services for large infrastructureless wireless networks, specifically those with access at the network layer. Poorly behaving nodes that are either selfish or malicious are addressed....
|
Apr 12 2005 |
|
|
|
|
|
|