Learn More
Knowledge of end-to-end path capacity is useful for video/audio stream adaptation, network management and overlay design. Capacity estimation in wired and last-hop wireless networks has been extensively investigated, but a thorough and systematic study in ad hoc, multihop wireless networks is still lacking. Yet the rate of a wireless link can change(More)
— With the increasingly deployed Wireless Personal Area Network (WPAN) devices, channel conflict has become very frequent and severe when one WPAN technology coexists with other WPAN technologies in the same interfering range. In this paper, we study the coexistence issue between various IEEE 802.15 based WPAN technologies. We present analytical models on(More)
Knowledge of end-to-end path capacity is useful for video/audio stream adaptation, rate control and overlay design. Capacity estimation in wired and last-hop wireless networks has been extensively investigated, but an in-depth study of path capacity in ad hoc, multihop wireless networks is still lacking. Since the " capacity " of a wireless link can vary(More)
In this paper, we show that decomposition methods with alpha seed-ing are extremely useful for solving a sequence of linear SVMs with more data than attributes. This strategy is motivated from (Keerthi and Lin 2003) which proved that for an SVM with data not linearly separable, after C is large enough, the dual solutions are at the same face. We explain why(More)
The rapid deployment of wireless networks in various environments necessitates the development of new end-to-end tools that monitor and measure the properties of wireless paths well. In this paper, we implement AdHoc Probe, a recently proposed path capacity estimation tool specially designed for the multi-hop ad hoc wireless environment. We present an(More)
— Opportunistic network is a type of Delay Tolerant Networks (DTN) where network communication opportunities appear opportunistic. In this study, we investigate opportunistic network scenarios based on public network traces, and our contributions are the following: First, we identify the censorship issue in network traces that usually leads to strongly(More)
IEEE 802.15.4 is an emerging wireless standard addressing the needs of Low-Rate Wireless Personal Area Networks with a focus on enabling various pervasive and ubiquitous applications that require interactions with our surrounding environments. In view of the application potential of IEEE 802.15.4, knowing the fundamental network properties soon becomes(More)
With wireless networking technologies extending into the fabrics of our working and operating environments, proper handling of intermittent wireless connectivity and network disruptions is of significance. As the sheer number of potential opportunistic application continues to surge (i.e. wireless sensor networks, underwater sensor networks, pocket switched(More)
Wireless communication is inherently vulnerable to errors from the dynamic wireless environment. Link layer packets discarded due to these errors impose a serious limitation on the maximum achievable through-put in the wireless channel. To enhance the overall throughput of wireless communication, it is necessary to have a link layer transmission scheme that(More)