Sciweavers

4305 search results - page 778 / 861
» Analysing Protocol Implementations
Sort
View
TCOM
2008
98views more  TCOM 2008»
15 years 2 months ago
Performance evaluation of multi-hop CSMA/CA networks in fading environments
The performance of multi-hop CSMA/CA networks has in most cases been evaluated via simulations, or analytically using a perfect collision channel model. Using such methods, one ca...
Duong A. Hoang, Ronald A. Iltis
111
Voted
TFS
2008
93views more  TFS 2008»
15 years 2 months ago
Using Fuzzy Logic to Design Separation Function in Flocking Algorithms
Abstract--Flocking algorithms essentially consist of three components: alignment, cohesion, and separation. To track a desired trajectory, the flock center should move along the de...
Dongbing Gu, Huosheng Hu
TII
2008
132views more  TII 2008»
15 years 2 months ago
Credential Management for Automatic Identification Solutions in Supply Chain Management
Current systems for automatic identification of goods presume a single administrative domain. However, in supply chain management systems temporary cooperations of multiple compani...
Marcel Henseler, Michael Rossberg, Guenter Schaefe...
TMC
2008
138views more  TMC 2008»
15 years 2 months ago
A Self-Repairing Tree Topology Enabling Content-Based Routing in Mobile Ad Hoc Networks
Content-based routing (CBR) provides a powerful and flexible foundation for distributed applications. Its communication model, based on implicit addressing, fosters decoupling amon...
Luca Mottola, Gianpaolo Cugola, Gian Pietro Picco
TON
2008
136views more  TON 2008»
15 years 2 months ago
Density-based anycast: a robust routing strategy for wireless ad hoc networks
Abstract--Existing anycast routing protocols solely route packets to the closest group member. In this paper, we introduce density-based anycast routing, a new anycast routing para...
Vincent Lenders, Martin May, Bernhard Plattner