Abstract
Considering some of the practical issues encountered when finding and mapping wireless network access points.
- Cheswick, B., Burch, H., and Branigan, S. Mapping and visualizing the Internet. In Proceedings of the USENIX Technical Conference, 2000. Google ScholarDigital Library
- Griffiths, J. Radio Wave Propagation and Antennas, An Introduction. Prentice-Hall, 1987.Google Scholar
- Goldhirsh, J. and Vogel, W.J. Handbook of Propagation Effects for Vehicular and Personal Mobile Satellite Systems. NASA Reference Publication 1274, Second Edition.Google Scholar
- Kirner, J.L. and Anderson, H.R. The application of land use cover data to wireless communication system design. In Proceedings of the ESRI User Conference, 1998.Google Scholar
- Nabritt, S.M. Modeling multpath in 802.11 systems; www.eetimes.com/story/OEG20021008S0001.Google Scholar
- Rappaport, T.S. Wireless Communication, Principles and Practice. Prentice-Hall, 1996. Google ScholarDigital Library
- Yee, J. and Pezeshki-Esfahani, H. Understanding wireless LAN performance trade-offs. Communication Systems Design (Nov. 2002).Google Scholar
Index Terms
- 802.11b access point mapping
Recommendations
A TDMA Based Scheduling Scheme in 802.11b WLANs with Access Point
ITCC '05: Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II - Volume 02This paper introduces a new scheduling scheme that provides fair access to all stations in 802.11b WLANs. The scheme divides the transmission opportunities between wireless stations according to their operating conditions. Stations that face errors and ...
Configuring role-based access control to enforce mandatory and discretionary access control policies
Access control models have traditionally included mandatory access control (or lattice-based access control) and discretionary access control. Subsequently, role-based access control has been introduced, along with claims that its mechanisms are general ...
Authorized! access denied, unauthorized! access granted
SIN '13: Proceedings of the 6th International Conference on Security of Information and NetworksExisting access control systems are mostly identity-based. However, such access control systems impose risks because recognized identity is not essentially an interpretation of good intentions of access. On the other hand, an un-identified individual ...
Comments