Sciweavers

385 search results - page 44 / 77
» A network flow based approach for network selection in dynam...
Sort
View
CIMCA
2006
IEEE
14 years 1 months ago
Model-driven Walks for Resource Discovery in Peer-to-Peer Networks
In this paper, a distributed and adaptive approach for resource discovery in peer-to-peer networks is presented. This approach is based on the mobile agent paradigm and the random...
Mohamed Bakhouya, Jaafar Gaber
TC
2008
13 years 7 months ago
Iterative Local Solutions for Connected Dominating Set in Ad Hoc Wireless Networks
We propose a general framework of the iterative local solution (ILS) for computing a connected dominating set (CDS) in ad hoc wireless networks, which include wireless sensor netwo...
Jie Wu, Fei Dai, Shuhui Yang
INFOCOM
2000
IEEE
13 years 12 months ago
Receiver Based Management of Low Bandwidth Access Links
Abstract—In this paper, we describe a receiver based congestion control policy that leverages TCP flow control mechanisms to prioritize mixed traffic loads across access links....
Neil T. Spring, Maureen Chesire, Mark Berryman, Vi...
ICISC
2004
127views Cryptology» more  ICISC 2004»
13 years 9 months ago
Identity-Based Access Control for Ad Hoc Groups
Abstract. The proliferation of group-centric computing and communication motivates the need for mechanisms to provide group access control. Group access control includes mechanisms...
Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi
INFOCOM
2005
IEEE
14 years 1 months ago
SyncScan: practical fast handoff for 802.11 infrastructure networks
Abstract— Wireless access networks scale by replicating base stations geographically and then allowing mobile clients to seamlessly “hand off” from one station to the next as...
Ishwar Ramani, Stefan Savage