Sciweavers

287 search results - page 14 / 58
» Networks of Excellence
Sort
View
PEWASUN
2005
ACM
14 years 3 months ago
Application of synchronous dynamic encryption system (SDES) in wireless sensor networks
Inherent to the wireless sensor networks are the two major problems of the broadcasting vulnerability, the limited computational capability and power budget. Even though security ...
Hamdy S. Soliman, Mohammed Omari
GLOBECOM
2006
IEEE
14 years 3 months ago
An Empirical Study on Statistical Properties of GSM Telephone Call Arrivals
 We investigate the statistical properties of both originated and terminated call arrivals in sets of real GSM telephone traffic data (TIM, Italy), emphasizing results obtained ...
Stefano Bregni, Roberto Cioffi, Maurizio Decina
TWC
2008
100views more  TWC 2008»
13 years 9 months ago
An Empirical Study on Time-Correlation of GSM Telephone Traffic
Abstract--In this paper, we investigate possible timecorrelation of answered call arrivals in sets of real GSM telephone traffic data. Instead of attempting to model the empirical ...
Stefano Bregni, Roberto Cioffi, Maurizio Decina
ISCC
2003
IEEE
138views Communications» more  ISCC 2003»
14 years 3 months ago
Connectivity Aware Routing - a Method for Finding Bandwidth Constrained Paths Over a Variety of Network Topologies
Multimedia traffic and real-time e-commerce applications can experience quality degradation in traditional networks such as the Internet. These difficulties can be overcome in n...
Karol Kowalik, Martin Collier
PADS
1999
ACM
14 years 2 months ago
Scheduling Critical Channels in Conservative Parallel Discrete Event Simulation
This paper introduces the Critical Channel Traversing (CCTJ algorithm, a new scheduling algorithm for both sequential and parallel discrete event simulation. CCT is a general cons...
Xiao Zhonge, Brian Unger, Rob Simmonds, John G. Cl...