Sciweavers

5805 search results - page 1106 / 1161
» Simulating networks of wireless sensors
Sort
View
AICCSA
2006
IEEE
126views Hardware» more  AICCSA 2006»
14 years 2 months ago
Restricted Shortest Path Routing with Concave Costs
Multi-constraint quality-of-service routing has become increasingly important as the Internet evolves to support real-time services. Restricted shortest path (RSP) is one of the i...
Pejman Khadivi, Shadrokh Samavi, Hossein Saidi
VTC
2006
IEEE
211views Communications» more  VTC 2006»
14 years 2 months ago
Amplify-and-Forward Cooperative Transmission with Multiple Relays Using Phase Feedback
Abstract-Cooperative transmission obtains the spatial diversity gains created by sharing antennas of terminals in wireless networks. Although the amplify-and-forward (AF) cooperati...
Dongwoo Lee, Young Seok Jung, Jae Hong Lee
WWIC
2005
Springer
112views Communications» more  WWIC 2005»
14 years 2 months ago
Mitigating Interference Between IEEE 802.16 Systems Operating in License-Exempt Mode
A rudimentary approach to mitigate interference issues in license-exempt 802.16 systems is presented. This approach operates by permitting each Base Station (BS), and associated Su...
Omar Ashagi, Seán Murphy, Liam Murphy
SAC
2004
ACM
14 years 2 months ago
LEMP: Lightweight Efficient Multicast Protocol for video on demand
In this paper, we propose a new scalable application-layer protocol, specifically designed for data streaming applications with large client sets. This is based upon a control hie...
Panayotis E. Fouliras, Spiros Xanthos, Nikolaos Ts...
IAW
2003
IEEE
14 years 2 months ago
An Evolutionary Approach to Generate Fuzzy Anomaly Signatures
Abstract— This paper describes the generation of fuzzy signatures to detect some cyber attacks. This approach is an enhancement to our previous work, which was based on the princ...
Fabio A. González, Jonatan Gómez, Ma...
« Prev « First page 1106 / 1161 Last » Next »