2009 4th International Conference on Computer Science &Amp; Education 2009
DOI: 10.1109/iccse.2009.5228434
|View full text |Cite
|
Sign up to set email alerts
|

The analysis of WLAN/3G interworking access based on a mobility model

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2011
2011
2011
2011

Publication Types

Select...
1

Relationship

1
0

Authors

Journals

citations
Cited by 1 publication
(4 citation statements)
references
References 21 publications
0
4
0
Order By: Relevance
“…It should be noted that any cell corruption in a LA results in a cell category change in it. In [7], as Fig. 1(c), the contribution is the performance evaluation of the network (i.e., from the user entrance to the WLAN cell point of view) against the attack.…”
Section: Model Of the Studymentioning
confidence: 99%
See 3 more Smart Citations
“…It should be noted that any cell corruption in a LA results in a cell category change in it. In [7], as Fig. 1(c), the contribution is the performance evaluation of the network (i.e., from the user entrance to the WLAN cell point of view) against the attack.…”
Section: Model Of the Studymentioning
confidence: 99%
“…It gives us the average number of times (i.e., ) that a mobile user enters to the WLAN cell, while performing a random walk in the LA and ALAs. Also as [7], there is an assumption that users are distributed all over the LA0. In other words, users' movements start from LA0 but their movements paths can pass through other LAs.…”
Section: Model Of the Studymentioning
confidence: 99%
See 2 more Smart Citations