Sciweavers

767 search results - page 144 / 154
» Network Coding for Wireless Mesh Networks: A Case Study
Sort
View
PERCOM
2008
ACM
14 years 7 months ago
Provably Correct Pervasive Computing Environments
The field of pervasive computing has seen a lot of exciting innovations in the past few years. However, there are currently no mechanisms for describing the properties and capabil...
Anand Ranganathan, Roy H. Campbell
MOBISYS
2007
ACM
14 years 7 months ago
Simplifying cyber foraging for mobile devices
Cyber foraging is the transient and opportunistic use of compute servers by mobile devices. The short market life of such devices makes rapid modification of applications for remo...
Rajesh Krishna Balan, Darren Gergle, Mahadev Satya...
INFOCOM
2007
IEEE
14 years 1 months ago
SPREAD: Foiling Smart Jammers Using Multi-Layer Agility
— In this paper, we address the problem of cross-layer denial of service attack in wireless data networks. We introduce SPREAD - a novel adaptive diversification approach to pro...
Xin Liu, Guevara Noubir, Ravi Sundaram, San Tan
CORR
2010
Springer
189views Education» more  CORR 2010»
13 years 7 months ago
Approaching Throughput-optimality in Distributed CSMA Scheduling Algorithms with Collisions
Abstract--It was shown recently that carrier sense multiple access (CSMA)-like distributed algorithms can achieve the maximal throughput in wireless networks (and task processing n...
Libin Jiang, Jean C. Walrand
TIT
2008
129views more  TIT 2008»
13 years 7 months ago
Cooperative Fading Regions for Decode and Forward Relaying
Abstract--Cooperative transmission protocols over fading channels are based on a number of relaying nodes to form virtual multiantenna transmissions. Diversity provided by these te...
Stefano Savazzi, Umberto Spagnolini