Sciweavers

1660 search results - page 256 / 332
» Reliable Communication in VPL
Sort
View
GLOBECOM
2009
IEEE
15 years 11 months ago
MAC Protocol Engine for Sensor Networks
—We present a novel approach for Medium Access Control (MAC) protocol design based on protocol engine. Current way of designing MAC protocols for a specific application is based...
Sinem Coleri Ergen, Piergiuseppe Di Marco, Carlo F...
P2P
2009
IEEE
114views Communications» more  P2P 2009»
15 years 11 months ago
Why Kad Lookup Fails
A Distributed Hash Table (DHT) is a structured overlay network service that provides a decentralized lookup for mapping objects to locations. In this paper, we study the lookup pe...
Hun Jeong Kang, Eric Chan-Tin, Nicholas Hopper, Yo...
NOSSDAV
2009
Springer
15 years 11 months ago
Robust live media streaming in swarms
Data dissemination in decentralized networks is often realized by using some form of swarming technique. Swarming enables nodes to gather dynamically in order to fulfill a certai...
Thomas Locher, Remo Meier, Roger Wattenhofer, Stef...
AUTOMOTIVEUI
2009
ACM
15 years 11 months ago
On timing and modality choice with local danger warnings for drivers
We present an experimental study on the effectiveness of five modality variants (speech, text-only, icon-only, two combinations of text and icons) for presenting local danger wa...
Yujia Cao, Sandro Castronovo, Angela Mahr, Christi...
IWCMC
2009
ACM
15 years 11 months ago
WMNSec: security for wireless mesh networks
Wireless Mesh Networks (WMNs) are gaining popularity as a flexible and inexpensive replacement for Ethernet-based infrastructure. However, WMN security has not been covered adequ...
Georg Lukas, Christian Fackroth