University Of Missouri-Kansas City

Displaying 1-5 of 5 results

  • White Papers // Jan 2012

    Quality of Service in wireless Ad Hoc Networks Through Self Admission Control

    An ad hoc network comprises of mobile nodes forming a temporary network on the fly without the aid of any centralized administration or standard support services. A novel approach is used to provide QoS at the MAC layer by making the nodes possess the self-admission control capability based on the...

    Provided By University Of Missouri-Kansas City

  • White Papers // Mar 2011

    Evaluating Geographic Vulnerabilities in Networks

    In wireless ad-hoc and wire-line networks used for search and rescue, military operations, and emergency communications; many failure modes are geographic in nature. They include jammers, explosions, enemy attacks, terrain issues, and natural causes like floods, storms, and fires. This paper proposes two methods to gain valuable insights into the...

    Provided By University Of Missouri-Kansas City

  • White Papers // Jun 2010

    QoS and Channel Aware Packet Bundling for VoIP and Data Traffic in Multi-Carrier Cellular Networks

    The authors study the problem of multiple packet bundling in multi-carrier cellular networks for VoIP and data traffic. In a time-slotted system such as the cdma2000 1xEV-DO downlink, part of a time-slot may not be fully utilized, if the packet sizes are small, as in the case of real-time VoIP...

    Provided By University Of Missouri-Kansas City

  • White Papers // Jan 2010

    Backup Path Restoration Design Using Path Generation Technique

    In this work, the paper presents a flow restoration based network design problem where one assumes the knowledge of possible failure situations. The paper uses the idea of a situation disjoint path couple (nominal path, backup path) which are constructed in such a way that atleast one of them is...

    Provided By University Of Missouri-Kansas City

  • White Papers // Oct 2009

    Dependability and Security Models

    The term dependability is commonly used by the fault tolerant and dependable computing community. Some researchers include security as one of the attributes of dependability. Security researchers consider confidentiality, integrity, and availability (And sometimes, non-repudiation) to represent the security status of the system and networks but it is lack of...

    Provided By University Of Missouri-Kansas City

  • White Papers // Jan 2010

    Backup Path Restoration Design Using Path Generation Technique

    In this work, the paper presents a flow restoration based network design problem where one assumes the knowledge of possible failure situations. The paper uses the idea of a situation disjoint path couple (nominal path, backup path) which are constructed in such a way that atleast one of them is...

    Provided By University Of Missouri-Kansas City

  • White Papers // Oct 2009

    Dependability and Security Models

    The term dependability is commonly used by the fault tolerant and dependable computing community. Some researchers include security as one of the attributes of dependability. Security researchers consider confidentiality, integrity, and availability (And sometimes, non-repudiation) to represent the security status of the system and networks but it is lack of...

    Provided By University Of Missouri-Kansas City

  • White Papers // Mar 2011

    Evaluating Geographic Vulnerabilities in Networks

    In wireless ad-hoc and wire-line networks used for search and rescue, military operations, and emergency communications; many failure modes are geographic in nature. They include jammers, explosions, enemy attacks, terrain issues, and natural causes like floods, storms, and fires. This paper proposes two methods to gain valuable insights into the...

    Provided By University Of Missouri-Kansas City

  • White Papers // Jun 2010

    QoS and Channel Aware Packet Bundling for VoIP and Data Traffic in Multi-Carrier Cellular Networks

    The authors study the problem of multiple packet bundling in multi-carrier cellular networks for VoIP and data traffic. In a time-slotted system such as the cdma2000 1xEV-DO downlink, part of a time-slot may not be fully utilized, if the packet sizes are small, as in the case of real-time VoIP...

    Provided By University Of Missouri-Kansas City

  • White Papers // Jan 2012

    Quality of Service in wireless Ad Hoc Networks Through Self Admission Control

    An ad hoc network comprises of mobile nodes forming a temporary network on the fly without the aid of any centralized administration or standard support services. A novel approach is used to provide QoS at the MAC layer by making the nodes possess the self-admission control capability based on the...

    Provided By University Of Missouri-Kansas City