Sciweavers

179 search results - page 31 / 36
» Performance Analysis of Stealth DHT with Mobile Nodes
Sort
View
MOBIHOC
2008
ACM
14 years 7 months ago
Cooperative transmit-power estimation under wireless fading
We study blind estimation of transmission power of a node based on received power measurements obtained under wireless fading. Specifically, the setup consists of a set of monitor...
Murtaza Zafer, Bongjun Ko, Ivan Wang Hei Ho
GECCO
2007
Springer
268views Optimization» more  GECCO 2007»
14 years 1 months ago
Vulnerability analysis and security framework (BeeSec) for nature inspired MANET routing protocols
Design, development and evaluation of adaptive, scalable, and power aware Bio/Nature inspired routing protocols has received a significant amount of attention in the recent past....
Nauman Mazhar, Muddassar Farooq
WOWMOM
2005
ACM
126views Multimedia» more  WOWMOM 2005»
14 years 1 months ago
An Integrated Neighbor Discovery and MAC Protocol for Ad Hoc Networks Using Directional Antennas
— Many MAC sub-layer protocols for supporting the usage of directional antennas in ad hoc networks have been proposed in literature. However, there remain two open issues that ar...
Gentian Jakllari, Wenjie Luo, Srikanth V. Krishnam...
TCAD
2008
93views more  TCAD 2008»
13 years 7 months ago
Chip Optimization Through STI-Stress-Aware Placement Perturbations and Fill Insertion
Starting at the 65-nm node, stress engineering to improve the performance of transistors has been a major industry focus. An intrinsic stress source--shallow trench isolation (STI)...
Andrew B. Kahng, Puneet Sharma, Rasit Onur Topalog...
MOBISYS
2003
ACM
14 years 7 months ago
An Entity Maintenance and Connection Service for Sensor Networks
In this paper, we present a middleware architecture for coordination services in sensor networks that facilitates interaction between groups of sensors which monitor different env...
Brian M. Blum, Prashant Nagaraddi, Anthony D. Wood...