Sciweavers

5493 search results - page 957 / 1099
» Effectively Polynomial Simulations
Sort
View
LCN
2008
IEEE
14 years 4 months ago
Modeling of two-flow interactions under SINR model in Multi-hop Wireless Networks
—Carrier Sense Multiple Access (CSMA) protocols in Multi-hop Wireless Networks (MHWN) are known to suffer from different forms of the hidden and exposed terminal problems, leadin...
Saquib Razak, Nael B. Abu-Ghazaleh, Vinay Kolar
WIMOB
2008
IEEE
14 years 4 months ago
A Moderate to Robust Game Theoretical Model for Intrusion Detection in MANETs
—One popular solution for reducing the resource consumption of Intrusion Detection System (IDS) in MANET is to elect a head-cluster (leader) to provide intrusion detection servic...
Hadi Otrok, Noman Mohammed, Lingyu Wang, Mourad De...
ICC
2007
IEEE
119views Communications» more  ICC 2007»
14 years 4 months ago
Experimental Performance Comparison of Rate-based and Store-and-Forward Transmission Mechanisms over Error-Prone Cislunar Commun
—Some work has been done in evaluating the performance of the rate-based SCPS-Pure Rate Control and the store-and-forward CFDP protocol. In this paper, we present an experimental...
Ruhai Wang, Anil Ayyagari, Xuan Wu, Bo Sun, Wei Ta...
ICC
2007
IEEE
140views Communications» more  ICC 2007»
14 years 4 months ago
Empirical Discussion on Directional MAC Protocols for Ad hoc Networks using Practice Smart Antennas
Recent studies on directional Media Access Control (MAC) protocols using smart antennas for wireless ad hoc networks have shown that directional MAC protocols outperform traditiona...
Masahiro Watanabe, Hikaru Mitsuhashi, Masaki Banda...
MOBIQUITOUS
2007
IEEE
14 years 4 months ago
TRULLO - local trust bootstrapping for ubiquitous devices
—Handheld devices have become sufficiently powerful that it is easy to create, disseminate, and access digital content (e.g., photos, videos) using them. The volume of such cont...
Daniele Quercia, Stephen Hailes, Licia Capra