Sciweavers

767 search results - page 108 / 154
» Network Coding for Wireless Mesh Networks: A Case Study
Sort
View
MOBIHOC
2004
ACM
14 years 1 months ago
Market sharing games applied to content distribution in ad-hoc networks
In third generation (3G) wireless data networks, repeated requests for popular data items can exacerbate the already scarce wireless spectrum. In this paper we propose an architec...
Michel X. Goemans, Erran L. Li, Vahab S. Mirrokni,...
MOBILIGHT
2010
13 years 3 months ago
Stealthy Compromise of Wireless Sensor Nodes with Power Analysis Attacks
Node capture is considered as one of the most critical issues in the security of wireless sensor networks. A popular approach to thwart the problem relies on the detection of event...
Giacomo de Meulenaer, François-Xavier Stand...
PERCOM
2004
ACM
14 years 8 months ago
Programming Pervasive and Mobile Computing Applications with the TOTA Middleware
Pervasive computing calls for suitable middleware and programming models to deal with large software systems dived in dynamic mobile network environments. Here we present the prog...
Marco Mamei, Franco Zambonelli
GECCO
2006
Springer
195views Optimization» more  GECCO 2006»
14 years 5 days ago
Studying XCS/BOA learning in Boolean functions: structure encoding and random Boolean functions
Recently, studies with the XCS classifier system on Boolean functions have shown that in certain types of functions simple crossover operators can lead to disruption and, conseque...
Martin V. Butz, Martin Pelikan
JSAC
2006
170views more  JSAC 2006»
13 years 8 months ago
Cross-Layer design in HSDPA system to reduce the TCP effect
This paper focuses on the interaction between the Transport Control Protocol (TCP) layer and the radio interface in the High Speed Downlink Packet Access (HSDPA) wireless system. I...
Mohamad Assaad, Djamal Zeghlache