Sciweavers

20 search results - page 4 / 4
» Analysis of Bluetooth Protocol in Presence of Bursty Traffic
Sort
View
WWW
2005
ACM
14 years 9 months ago
On the lack of typical behavior in the global Web traffic network
We offer the first large-scale analysis of Web traffic based on network flow data. Using data collected on the Internet2 network, we constructed a weighted bipartite clientserver ...
Mark Meiss, Filippo Menczer, Alessandro Vespignani
JSAC
2011
127views more  JSAC 2011»
13 years 3 months ago
Opportunistic Multiple Access for Cognitive Radio Networks
—In this paper, opportunistic multiple access to the under-utilized channel resources is investigated. Exploiting source burstiness, secondary cognitive nodes utilizes primary no...
Amr A. El-Sherif, Ahmed K. Sadek, K. J. Ray Liu
SECON
2010
IEEE
13 years 6 months ago
Adaptive Instantiation of the Protocol Interference Model in Mission-Critical Wireless Networks
Interference model is the basis of MAC protocol design in wireless networks, and it directly affects the efficiency and predictability of wireless messaging. To exploit the strengt...
Xin Che, Xiaohui Liu, Xi Ju, Hongwei Zhang
GLOBECOM
2010
IEEE
13 years 6 months ago
Analysis of Messaging Load in a P2PP Overlay Network under Churn
We analyze the performance of a DHT-based P2P overlay network in resource access and overlay maintenance activities. We use a cross-platform implementation of the protocol called P...
Otso Kassinen, Erkki Harjula, Mika Ylianttila
MOBIHOC
2005
ACM
14 years 8 months ago
Inducing spatial clustering in MAC contention for spread spectrum ad hoc networks
This paper proposes a new principle for designing MAC protocols for spread spectrum based ad hoc networks ? inducing spatial clustering in contending transmitters/receivers. We fi...
Xiangying Yang, Gustavo de Veciana