Sciweavers

1177 search results - page 207 / 236
» Continuum Traffic Simulation
Sort
View
TON
2002
138views more  TON 2002»
13 years 8 months ago
Single-packet IP traceback
The design of the IP protocol makes it difficult to reliably identify the originator of an IP packet. Even in the absence of any deliberate attempt to disguise a packet's orig...
Alex C. Snoeren, Craig Partridge, Luis A. Sanchez,...
CORR
2010
Springer
98views Education» more  CORR 2010»
13 years 8 months ago
Structure-Aware Stochastic Control for Transmission Scheduling
In this report, we consider the problem of real-time transmission scheduling over time-varying channels. We first formulate the transmission scheduling problem as a Markov decisio...
Fangwen Fu, Mihaela van der Schaar
MONET
2007
126views more  MONET 2007»
13 years 8 months ago
Performance Evaluation of a Power Management Scheme for Disruption Tolerant Network
Disruption Tolerant Network (DTN) is characterized by frequent partitions and intermittent connectivity. Power management issue in such networks is challenging. Existing power man...
Yong Xi, Mooi Choo Chuah, K. Chang
TMC
2008
219views more  TMC 2008»
13 years 8 months ago
COACS: A Cooperative and Adaptive Caching System for MANETs
This paper introduces a cooperation-based database caching system for Mobile Ad Hoc Networks (MANETs). The heart of the system is the nodes that cache submitted queries. The querie...
Hassan Artail, Haïdar Safa, Khaleel W. Mersha...
CORR
2010
Springer
205views Education» more  CORR 2010»
13 years 7 months ago
An Algorithm for Detection of Selfish Nodes in Wireless Mesh Networks
—Wireless mesh networks (WMNs) are evolving as a key technology for next-generation wireless networks showing raid progress and numerous applications. These networks have the pot...
Jaydip Sen, Kaustav Goswami