Sciweavers

1247 search results - page 198 / 250
» Performance Analysis of Peer-to-Peer Networks for File Distr...
Sort
View
TWC
2008
156views more  TWC 2008»
13 years 9 months ago
Secure and Fault-Tolerant Event Boundary Detection in Wireless Sensor Networks
Event boundary detection is in and of itself a useful application in wireless sensor networks (WSNs). Typically, it includes the detection of a large-scale spatial phenomenon such ...
Kui Ren, Kai Zeng, Wenjing Lou
MONET
2010
125views more  MONET 2010»
13 years 7 months ago
GTPP: General Truncated Pyramid Peer-to-Peer Architecture over Structured DHT Networks
— Hierarchical Distributed Hash Table (DHT) architectures have been among the most interesting research topics since the birth of flat DHT architecture. However, most of the prev...
Zhonghong Ou, Erkki Harjula, Timo Koskela, Mika Yl...
TPDS
2010
159views more  TPDS 2010»
13 years 7 months ago
Exploring In-Situ Sensing Irregularity in Wireless Sensor Networks
The circular sensing model has been widely used to estimate performance of sensing applications in existing analysis and simulations. While this model provides valuable high-level...
Joengmin Hwang, Tian He, Yongdae Kim
INFOCOM
2008
IEEE
14 years 3 months ago
Joint Effects of Radio Channels and Node Mobility on Link Dynamics in Wireless Networks
—In this paper, we study link properties over dynamic radio channels based on analytical models and simulations. Specifically, channel variability and mobility are investigated ...
Wenye Wang, Ming Zhao 0001
INFOCOM
2008
IEEE
14 years 3 months ago
Prioritized Repeated Eliminations Multiple Access: A Novel Protocol for Wireless Networks
—A new and simple MAC protocol is proposed. Each node transmits a burst with length sampled from a geometric distribution with parameter q followed by a carrier sense slot. A nod...
Greger Wikstrand, Thomas Nilsson, Mark S. Doughert...