Search Results - "Lilakiatsakun, W."

  • Showing 1 - 8 results of 8
Refine Results
  1. 1

    TCP performances over wireless link deploying delayed ACK by Lilakiatsakun, W., Seneviratne, A.

    “…Understanding the impact of TCP techniques toward wireless environment is important because the need of mobile devices have been significantly increased…”
    Get full text
    Conference Proceeding
  2. 2

    Wireless home networks based on a hierarchical Bluetooth scatternet architecture by Lilakiatsakun, W., Seneviratne, A.

    “…Wireless home networking is being addressed by numerous groups such as the HomeRF working group, and the Bluetooth consortium. Of these, Bluetooth technology…”
    Get full text
    Conference Proceeding
  3. 3

    Enhancing TCP energy efficiency for mobile hosts by Lilakiatsakun, W., Seneviratne, A.

    “…We present the finding of an investigation into an energy and performance enhancing technique for TCP operating in wireless networking environments. This…”
    Get full text
    Conference Proceeding
  4. 4

    Improving delayed acknowledgement performances over wireless links by Lilakiatsakun, W.

    “…Recently, the delayed ACK have been widely used in many implementations. Unfortunately, studies have shown that reducing ACKs by delayed ACK produces negative…”
    Get full text
    Conference Proceeding
  5. 5

    A topology for service discovery over multiple administrative domains by Sookavatana, P., Seneviratne, A., Lilakiatsakun, W.

    “…The emerging heterogeneous network environments and the wide widespread deploying Internet applications introduce an interesting requirement: how to use any…”
    Get full text
    Conference Proceeding
  6. 6

    The cryptographic trailer based authentication scheme for ARP by Limmaneewichid, P., Lilakiatsakun, W.

    “…This paper proposes a novel ARP authentication scheme based on an ARP authentication trailer. The scheme provides a method to defend ARP attacks. In addition…”
    Get full text
    Conference Proceeding
  7. 7

    Computer network security based on Support Vector Machine approach by Somwang, P., Lilakiatsakun, W.

    “…At present, incidents of computer networks attack are significantly increasing therefore the effective Intrusion Detection Systems (IDS) are essential for…”
    Get full text
    Conference Proceeding
  8. 8

    Estimation of band level resolutions of human chromosome images by Sethakulvichai, W., Manitpornsut, S., Wiboonrat, M., Lilakiatsakun, W., Assawamakin, A., Tongsima, S.

    “…Current estimation methods for band level resolutions of human chromosome images in cytogenetic laboratories are time consuming and required experienced…”
    Get full text
    Conference Proceeding