Sciweavers

633 search results - page 114 / 127
» Reliable Multicast in Mobile Networks
Sort
View
KES
2005
Springer
14 years 27 days ago
Bayesian Inference Driven Behavior Network Architecture for Avoiding Moving Obstacles
This paper presents a technique for an intelligent robot to adaptively behave in unforeseen and dynamic circumstances. Since the traditional methods utilized the relatively reliabl...
Hyeun-Jeong Min, Sung-Bae Cho
VTC
2007
IEEE
117views Communications» more  VTC 2007»
14 years 1 months ago
Distributed Iterative Detection in an Interference Limited Cellular Network
—This paper presents a novel strategy for interference mitigation in an uplink of high reuse cellular networks through distributive processing. It is proposed that the neighborin...
Shahid Khattak, Gerhard Fettweis
SC
2004
ACM
14 years 25 days ago
Kosha: A Peer-to-Peer Enhancement for the Network File System
This paper presents Kosha, a peer-to-peer (p2p) enhancement for the widely-used Network File System (NFS). Kosha harvests redundant storage space on cluster nodes and user desktop...
Ali Raza Butt, Troy A. Johnson, Yili Zheng, Y. Cha...
WCNC
2010
IEEE
13 years 11 months ago
Modelling Angle Spread Autocorrelations and the Impact on Multi-User Diversity Gains
—One way of modelling the wireless channel is in a statistical manner, based on a few parameters describing the characteristics of the environment. In most current wireless chann...
Niklas Jalden, Per Zetterberg, Björn E. Otter...
MOBIHOC
2005
ACM
14 years 7 months ago
The feasibility of launching and detecting jamming attacks in wireless networks
Wireless networks are built upon a shared medium that makes it easy for adversaries to launch jamming-style attacks. These attacks can be easily accomplished by an adversary emitt...
Wenyuan Xu, Wade Trappe, Yanyong Zhang, Timothy Wo...