Sciweavers

830 search results - page 67 / 166
» Generalizing Global Constraints Based on Network Flows
Sort
View
IFIPTM
2009
127views Management» more  IFIPTM 2009»
13 years 6 months ago
A Risk Based Approach to Limit the Effects of Covert Channels for Internet Sensor Data Aggregators for Sensor Privacy
Effective defense against Internet threats requires data on global real time network status. Internet sensor networks provide such real time network data. However, an organization...
Camilo H. Viecco, L. Jean Camp
INFOCOM
2006
IEEE
14 years 2 months ago
Cross-Layer Congestion Control, Routing and Scheduling Design in Ad Hoc Wireless Networks
Abstract— This paper considers jointly optimal design of crosslayer congestion control, routing and scheduling for ad hoc wireless networks. We first formulate the rate constrai...
Lijun Chen, Steven H. Low, Mung Chiang, John C. Do...
ECMAST
1997
Springer
172views Multimedia» more  ECMAST 1997»
14 years 1 months ago
A Multicast Network Architecture for Large Scale Collaborative Virtual Environments
This paper introduces a multicast based architecture for supporting large scale Collaborative Virtual Environments (CVEs). The paper begins by defining CVEs, discussing the motivat...
Chris Greenhalgh, Steve Benford
EURONGI
2006
Springer
14 years 16 days ago
Performance Analysis of Wireless Multihop Data Networks
We consider wireless multihop data networks with random multi-access mechanisms at the MAC layer. In general, our aim is to study the performance as perceived by users in a dynamic...
Nidhi Hegde, Alexandre Proutiére
MOBIHOC
2006
ACM
14 years 8 months ago
Starvation mitigation through multi-channel coordination in CSMA multi-hop wireless networks
Existing multi-channel protocols have been demonstrated to significantly increase aggregate throughput compared to single-channel protocols. However, we show that despite such imp...
Jingpu Shi, Theodoros Salonidis, Edward W. Knightl...