Sciweavers

87 search results - page 16 / 18
» Counting-Sort and Routing in a Single Hop Radio Network
Sort
View
AINA
2007
IEEE
14 years 1 months ago
Power and Delay Analysis of The WEAC Protocol Based MANET Under Video Transport
Abstract— Transporting video over wireless networks has twofold constraints. Not only should it satisfy delay requirements but power minimization and QoS issues should be handled...
Hafiz M. Asif, Tarek R. Sheltami
WWW
2004
ACM
14 years 8 months ago
RDFPeers: a scalable distributed RDF repository based on a structured peer-to-peer network
Centralized Resource Description Framework (RDF) repositories have limitations both in their failure tolerance and in their scalability. Existing Peer-to-Peer (P2P) RDF repositori...
Min Cai, Martin R. Frank
EWSN
2010
Springer
14 years 4 months ago
F-LQE: A Fuzzy Link Quality Estimator for Wireless Sensor Networks
Abstract. Radio Link Quality Estimation (LQE) is a fundamental building block for Wireless Sensor Networks, namely for a reliable deployment, resource management and routing. Exist...
Nouha Baccour, Anis Koubaa, Habib Youssef, Maissa ...
INFOCOM
2009
IEEE
14 years 2 months ago
muNet: Harnessing Multiuser Capacity in Wireless Mesh Networks
— We present muNet, a wireless mesh network design and implementation to harness the multiuser capacity of wireless channels. Traditionally, media access control is designed to s...
Li Li, Richard Alimi, Ramachandran Ramjee, Harish ...
LISA
2000
13 years 8 months ago
Tracing Anonymous Packets to Their Approximate Source
Most denial-of-service attacks are characterized by a flood of packets with random, apparently valid source addresses. These addresses are spoofed, created by a malicious program ...
Hal Burch, Bill Cheswick