Browsing 2006 Auswireless Conference by Title

UTSePress Research/Manakin Repository

Search UTSePress Research


Advanced Search

Browse

My Account

Browsing 2006 Auswireless Conference by Title

Sort by: Order: Results:

  • Pawlikowski, Krzysztof.; Sirisena, Harsha R.; Jayananthan, A. (2007-03-12)
    TCP optimization for wireless networks to deal with packet losses due to fading, shadowing and contention should preferably maintain TCP end-to-end semantics with minimal dependence on intermediate nodes. The development ...
  • Ni, David.; Arndt, Dickey.; Ni, Jianjun.; Gross, Julia.; Ngo, Phong.; Phan, Chau. (2007-03-12)
    This paper describes a design effort for a prototype ultra-wideband (UWB) tracking system that is currently under development at NASA Johnson Space Center (JSC). The system is being studied for use in tracking of lunar/Mars ...
  • Ali, Borhanuddin Mohd.; Fun, Chan Sook.; Abdullah, Mohd. Khazani.; Khatun, Sabira.; Saeed, Rashid A. (2007-03-12)
    UWB communication refers to impulse radio technology, in which wireless data is transferred using time domain modulation of data and extremely narrow radio impulses (i.e. nanosecond duration) that occupy typically several ...
  • Untitled 
    Unknown author (2007-03-12)
  • Nkansah-Gyekye, Yaw.; Agbinya, Johnson I. (2007-03-12)
    This paper reports on the design and implementation of multi-criteria vertical handoff decision algorithms in a heterogeneous wireless wide area network (WWAN) and a wireless local area network (WLAN) environment. An ...
  • Dao, Nghia T; Wei, Xun; Malaney, Robert A. (2007-03-12)
    Crucial to supporting voice over 802.11b is the knowledge of voice capacity (Nc) of a single Access Point. This paper provides an analytical formulation of Nc in the case where all traffic in the network is voice. Our ...
  • Sun, Yan; Kumar, Anup; Srinivasam, S. (2007-03-12)
    This article presents an incremental and scalable solution for tracing Denial of Service (DoS) and Distributed DoS (DDoS) attacks. Our approach allows the victim to identify the network paths traversed by attack traffic ...