Sciweavers

2691 search results - page 464 / 539
» Security in Ad Hoc Networks
Sort
View
PEWASUN
2008
ACM
13 years 11 months ago
Modular network trace analysis
In this paper we present EDAT, a tool designed for the analysis of trace files from network simulations and experiments. The EDAT framework encapsulates analysis steps in extensib...
Wolfgang Kieß, Nadine Chmill, Ulrich Wittels...
TMC
2008
108views more  TMC 2008»
13 years 10 months ago
Improving Throughput and Fairness by Reducing Exposed and Hidden Nodes in 802.11 Networks
Abstract--Two well-known problems that can cause performance degradations in IEEE 802.11 wireless networks are the exposednode (EN) and hidden-node (HN) problems. Although there ha...
Li Bin Jiang, Soung Chang Liew
TSP
2008
116views more  TSP 2008»
13 years 10 months ago
Computation of Delay-Free Nonlinear Digital Filter Networks: Application to Chaotic Circuits and Intracellular Signal Transducti
Abstract--A method for the computation of nonlinear digital filter networks containing delay-free loops is proposed. By preserving the topology of the network this method permits t...
Federico Fontana, Federico Avanzini
ICC
2009
IEEE
167views Communications» more  ICC 2009»
13 years 7 months ago
Efficient Adaptive Routing in Delay Tolerant Networks
Conventional routing algorithms in mobile ad hoc networks (MANETs), i.e., multi-hop forwarding, assume the existence of contemporaneous source-destination paths and are not scalabl...
Cong Liu, Jie Wu
CORR
2011
Springer
177views Education» more  CORR 2011»
13 years 1 months ago
Downlink SDMA with Limited Feedback in Interference-Limited Wireless Networks
The tremendous capacity gains promised by space division multiple access (SDMA) depend critically on the accuracy of the transmit channel state information. In the broadcast chann...
Marios Kountouris, Jeffrey G. Andrews