Sciweavers

1339 search results - page 112 / 268
» Optimal layered multicast
Sort
View
INFOCOM
2007
IEEE
14 years 3 months ago
Performance Comparison of Detection Schemes for MAC Layer Misbehavior
— This paper revisits the problem of detecting greedy behavior in the IEEE 802.11 MAC protocol by evaluating the performance of two previously proposed schemes: DOMINO and the Se...
Alvaro A. Cárdenas, Svetlana Radosavac, Joh...
VTC
2006
IEEE
152views Communications» more  VTC 2006»
14 years 3 months ago
Cross-Layer Resource Allocation via Geometric Programming in Fading Broadcast Channels
Abstract— In a fading broadcast channel (BC), Queue Proportional Scheduling (QPS) is presented via geometric programming (GP). Given the current queue state, QPS allocates a data...
Kibeom Seong, Ravi Narasimhan, John M. Cioffi
SIGMETRICS
2004
ACM
115views Hardware» more  SIGMETRICS 2004»
14 years 2 months ago
Emulating low-priority transport at the application layer: a background transfer service
Low priority data transfer across the wide area is useful in several contexts, for example for the dissemination of large files such as OS updates, content distribution or prefet...
Peter B. Key, Laurent Massoulié, Bing Wang
ICOIN
2001
Springer
14 years 1 months ago
Integrated Transport Layer Security: End-to-End Security Model between WTLS and TLS
WAP is a set of protocols that optimizes standard TCP/IP/HTTP/HTML protocols, for use under the low bandwidth, high latency conditions often found in wireless networks. But, end-t...
Eun-Kyeong Kwon, Yong-Gu Cho, Ki-Joon Chae
DATE
2004
IEEE
105views Hardware» more  DATE 2004»
14 years 1 months ago
Time-Energy Design Space Exploration for Multi-Layer Memory Architectures
This paper presents an exploration algorithm which examines execution time and energy consumption of a given application, while considering a parameterized memory architecture. Th...
Radoslaw Szymanek, Francky Catthoor, Krzysztof Kuc...