Sciweavers

411 search results - page 33 / 83
» Design of a Transmission Protocol for a CVE
Sort
View
ICPADS
2002
IEEE
14 years 1 months ago
The Impact of RTS Threshold on IEEE 802.11 MAC Protocol
Wireless technologies and applications received great attention in recent years. The medium access control (MAC) protocol is the main element that determines the efficiency in sha...
Shiann-Tsong Sheu, Tobias Chen, Jenhui Chen, Fun Y...
IJBC
2010
80views more  IJBC 2010»
13 years 6 months ago
Symbolic Dynamical Model of Average Queue Size of Random Early Detection Algorithm
In this paper, a symbolic dynamical model of the average queue size of the random early detection (RED) algorithm is proposed. The conditions on both the system parameters and the...
Charlotte Yuk-Fan Ho, Bingo Wing-Kuen Ling, Herber...
ADHOCNOW
2006
Springer
14 years 2 months ago
Initialization for Ad Hoc Radio Networks with Carrier Sensing and Collision Detection
We consider an ad-hoc network consisting of devices that try to gain access for transmission through a shared communication channel. We redesign randomized protocol of Cai, Lu and ...
Jacek Cichon, Miroslaw Kutylowski, Marcin Zawada
TMC
2010
142views more  TMC 2010»
13 years 7 months ago
DGRAM: A Delay Guaranteed Routing and MAC Protocol for Wireless Sensor Networks
This paper presents an integrated MAC and routing protocol called Delay Guaranteed Routing and MAC (DGRAM) for delay sensitive wireless sensor network (WSN) applications. DGRAM is...
Shanti Chilukuri, Anirudha Sahoo
CORR
2010
Springer
143views Education» more  CORR 2010»
13 years 8 months ago
Opportunistic Routing in Ad Hoc Networks: How many relays should there be? What rate should nodes use?
Opportunistic routing is a multi-hop routing scheme which allows for selection of the best immediately available relay. In blind opportunistic routing protocols, where transmitters...
Joseph Blomer, Nihar Jindal