Search Results - "Lilakiatsakun, W."
-
1
TCP performances over wireless link deploying delayed ACK
Published in The 57th IEEE Semiannual Vehicular Technology Conference, 2003. VTC 2003-Spring (2003)“…Understanding the impact of TCP techniques toward wireless environment is important because the need of mobile devices have been significantly increased…”
Get full text
Conference Proceeding -
2
Wireless home networks based on a hierarchical Bluetooth scatternet architecture
Published in Proceedings. Ninth IEEE International Conference on Networks, ICON 2001 (2001)“…Wireless home networking is being addressed by numerous groups such as the HomeRF working group, and the Bluetooth consortium. Of these, Bluetooth technology…”
Get full text
Conference Proceeding -
3
Enhancing TCP energy efficiency for mobile hosts
Published in Proceedings 10th IEEE International Conference on Networks (ICON 2002). Towards Network Superiority (Cat. No.02EX588) (2002)“…We present the finding of an investigation into an energy and performance enhancing technique for TCP operating in wireless networking environments. This…”
Get full text
Conference Proceeding -
4
Improving delayed acknowledgement performances over wireless links
Published in 2005 13th IEEE International Conference on Networks Jointly held with the 2005 IEEE 7th Malaysia International Conf on Communic (2005)“…Recently, the delayed ACK have been widely used in many implementations. Unfortunately, studies have shown that reducing ACKs by delayed ACK produces negative…”
Get full text
Conference Proceeding -
5
A topology for service discovery over multiple administrative domains
Published in Proceedings 10th IEEE International Conference on Networks (ICON 2002). Towards Network Superiority (Cat. No.02EX588) (2002)“…The emerging heterogeneous network environments and the wide widespread deploying Internet applications introduce an interesting requirement: how to use any…”
Get full text
Conference Proceeding -
6
The cryptographic trailer based authentication scheme for ARP
Published in The 8th Electrical Engineering/ Electronics, Computer, Telecommunications and Information Technology (ECTI) Association of Thailand - Conference 2011 (01-05-2011)“…This paper proposes a novel ARP authentication scheme based on an ARP authentication trailer. The scheme provides a method to defend ARP attacks. In addition…”
Get full text
Conference Proceeding -
7
Computer network security based on Support Vector Machine approach
Published in 2011 11th International Conference on Control, Automation and Systems (01-10-2011)“…At present, incidents of computer networks attack are significantly increasing therefore the effective Intrusion Detection Systems (IDS) are essential for…”
Get full text
Conference Proceeding -
8
Estimation of band level resolutions of human chromosome images
Published in 2012 Ninth International Conference on Computer Science and Software Engineering (JCSSE) (01-05-2012)“…Current estimation methods for band level resolutions of human chromosome images in cytogenetic laboratories are time consuming and required experienced…”
Get full text
Conference Proceeding