Sciweavers

2634 search results - page 401 / 527
» Infrastructured Ad Hoc Networks
Sort
View
132
Voted
GECCO
2007
Springer
268views Optimization» more  GECCO 2007»
15 years 9 months ago
Vulnerability analysis and security framework (BeeSec) for nature inspired MANET routing protocols
Design, development and evaluation of adaptive, scalable, and power aware Bio/Nature inspired routing protocols has received a significant amount of attention in the recent past....
Nauman Mazhar, Muddassar Farooq
140
Voted
PPL
2008
94views more  PPL 2008»
15 years 3 months ago
Self-Stabilizing Graph Protocols
We provide self-stabilizing algorithms to obtain and maintain a maximal matching, maximal independent set or minimal dominating set in a given system graph. They converge in linea...
Wayne Goddard, Stephen T. Hedetniemi, David Pokras...
190
Voted
BIOWIRE
2007
Springer
15 years 9 months ago
Epcast: Controlled Dissemination in Human-Based Wireless Networks Using Epidemic Spreading Models
Epidemics-inspired techniques have received huge attention in recent years from the distributed systems and networking communities. These algorithms and protocols rely on probabili...
Salvatore Scellato, Cecilia Mascolo, Mirco Musoles...
122
Voted
SUTC
2006
IEEE
15 years 9 months ago
Protocol assessment issues in low duty cycle sensor networks: The switching energy
Energy assessment of MAC protocols for wireless sensor networks is generally based on the times of transmit, receive and sleep modes. The switching energy between two consecutive ...
Antonio G. Ruzzelli, Gregory M. P. O'Hare, Richard...
154
Voted
OTM
2004
Springer
15 years 9 months ago
Towards a Peer-to-Peer Event Broker Grid in a Hybrid Network Environment
Peer-to-peer networks and grids offer promising paradigms for developing efficient distributed systems and applications. Event-based middleware is becoming a core architectural el...
Eiko Yoneki, Jean Bacon