Sciweavers

119 search results - page 10 / 24
» Designing Network Protocols for Good Equilibria
Sort
View
JSAC
2008
196views more  JSAC 2008»
13 years 6 months ago
Comparison and Evaluation of the T-Lohi MAC for Underwater Acoustic Sensor Networks
Abstract--This paper introduces T-Lohi, a new class of distributed and energy-efficient media-access protocols (MAC) for underwater acoustic sensor networks (UWSN). MAC design for ...
Affan A. Syed, Wei Ye, John S. Heidemann
IPTPS
2003
Springer
13 years 12 months ago
Rationality and Self-Interest in Peer to Peer Networks
Much of the existing work in peer to peer networking assumes that users will follow prescribed protocols without deviation. This assumption ignores the user’s ability to modify ...
Jeffrey Shneidman, David C. Parkes
MOBICOM
2006
ACM
14 years 21 days ago
OURS: optimal unicast routing systems in non-cooperative wireless networks
We propose novel solutions for unicast routing in wireless networks consisted of selfish terminals: in order to alleviate the inevitable over-payment problem (and thus economic i...
Weizhao Wang, Xiang-Yang Li, Stephan Eidenbenz, Yu...
MOBICOM
2009
ACM
14 years 1 months ago
Frequency-aware rate adaptation and MAC protocols
There has been burgeoning interest in wireless technologies that can use wider frequency spectrum. Technology advances, such as 802.11n and ultra-wideband (UWB), are pushing towar...
Hariharan Rahul, Farinaz Edalat, Dina Katabi, Char...
PERVASIVE
2004
Springer
14 years 2 days ago
eSeal - A System for Enhanced Electronic Assertion of Authenticity and Integrity
Ensuring authenticity and integrity are important tasks when dealing with goods. While in the past seal wax was used to ensure the integrity, electronic devices are now able to tak...
Christian Decker, Michael Beigl, Albert Krohn, Phi...