Sciweavers

597 search results - page 98 / 120
» Combinatorial Models for Cooperation Networks
Sort
View
MOBIHOC
2005
ACM
14 years 8 months ago
A secure ad-hoc routing approach using localized self-healing communities
Mobile ad hoc networks (MANETs) are vulnerable to routing attacks, especially attacks launched by non-cooperative (selfish or compromised) network members and appear to be protoco...
Jiejun Kong, Xiaoyan Hong, Yunjung Yi, Joon-Sang P...

Publication
194views
15 years 7 months ago
Design and Simulation of ATM-ABR End System Congestion Control
We develop a simulation model for the ATM ABR service, and use it to engineer ABR congestion control behavior. Although significant work has been performed on ABR rate allocation a...
Sonia Fahmy, Raj Jain, Rohit Goyal and Bobby Vanda...
IAJIT
2007
150views more  IAJIT 2007»
13 years 9 months ago
Fuzzy Active Queue Management for Congestion Control in Wireless Ad-Hoc
: Mobile ad-hoc network is a network without infrastructure where every node has its own protocols and services for powerful cooperation in the network. Every node also has the abi...
Essam Natsheh, Adznan B. Jantan, Sabira Khatun, Su...
IWSOS
2009
Springer
14 years 3 months ago
A Self-organizing Approach to Activity Recognition with Wireless Sensors
Abstract. In this paper, we describe an approach to activity recognition, which is based on a self-organizing, ad hoc network of body-worn sensors. It makes best use of the availab...
Clemens Holzmann, Michael Haslgrübler
AEI
2007
119views more  AEI 2007»
13 years 9 months ago
Exploring the CSCW spectrum using process mining
Process mining techniques allow for extracting information from event logs. For example, the audit trails of a workflow management system or the transaction logs of an enterprise ...
Wil M. P. van der Aalst