Zobrazeno 1 - 10
of 107
pro vyhledávání: '"Andrzej R. Pach"'
Publikováno v:
Journal of Telecommunications and Information Technology, Iss 1 (2023)
In multirate ad hoc networks, mobile stations usually adapt their transmission rates to the channel conditions. This paper investigates the behavior of IEEE 802.11b/g cards in a multirate ad hoc environment. The theoretical upper bound estimation of
Externí odkaz:
https://doaj.org/article/e8b1d20b81184c53b94a1090c3eaae7a
Publikováno v:
Journal of Telecommunications and Information Technology, Iss 4 (2023)
This paper presents a novel QoS architecture for IEEE 802.11 multihop broadband ad hoc networks integrated with infrastructure. The authors describe its features, including MAC layer measurements, traffic differentiation, and admission control. The m
Externí odkaz:
https://doaj.org/article/e4d53f4cc2a94157a89d770e544904f5
Publikováno v:
EURASIP Journal on Wireless Communications and Networking, Vol 2010 (2010)
Externí odkaz:
https://doaj.org/article/7179354789e24492812a9d6fc72484b9
Publikováno v:
Journal of Lightwave Technology. 35:1868-1875
We state a new problem of \emph{itinerant routing} in elastic optical networks, which we define as the establishment and reconfiguration of an \emph{itinerant connection}. In an itinerant connection, one of the connection end nodes is allowed to chan
We propose the novel idea of interoperator fixed-mobile network sharing, which can be software-defined and readily-deployed. We study the benefits which the sharing brings in terms of resiliency, and show that, with the appropriate placement of a few
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::7e1053aba13e8371cdcccb06c05b599f
http://arxiv.org/abs/1905.04736
http://arxiv.org/abs/1905.04736
Publikováno v:
Communications in Computer and Information Science ISBN: 9783319699103
MCSS
MCSS
Intrusion prevention systems are widely used as one of the core security services deployed by the majority of contemporary organizations. Although simple in operation, they tend to be difficult to configure due to the wide range of vendors using diff
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::ce0db90c5b54a108d4b40f96dfbe4cea
https://doi.org/10.1007/978-3-319-69911-0_4
https://doi.org/10.1007/978-3-319-69911-0_4
Autor:
Marcin Niemiec, Andrzej R. Pach
Publikováno v:
IEEE Communications Magazine. 51:36-41
The interest in quantum-based security methods has been growing rapidly in recent years. New implementations of quantum key distribution and new network services supported by this solution are being introduced. The reason behind the growing popularit
Publikováno v:
2016 International Conference on Signals and Electronic Systems (ICSES).
Security and reliability are crucial requirements of modern information systems. Therefore, appropriate error detection mechanisms are necessary, in particular in systems processing confidential or private information, i.e. modern encryptors. This pa
Publikováno v:
Scopus-Elsevier
We evaluate the downstream performance of our novel interoperator fixed-mobile network sharing, in which operators exchange data in their access networks. We propose a performance evaluation algorithm, and report credible performance evaluation resul
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::f62b1a57a3164ca5b7b10a78c9e43b5e
Publikováno v:
Security and Communication Networks. 6:509-522
Selfish users are known to be a severe security threat for wireless ad hoc networks. In particular, they can exploit mechanisms designed to assure quality of service (QoS) in the network. In this paper, the problem of backoff misbehavior in IEEE 802.