Sciweavers

5234 search results - page 991 / 1047
» Simulation of Computer Network Attacks
Sort
View
125
Voted
ADHOCNOW
2009
Springer
15 years 9 months ago
Auction Aggregation Protocols for Wireless Robot-Robot Coordination
Abstract. Robots coordinate among themselves to select one of them to respond to an event reported to one of robots. The goal is to minimize the communication cost of selecting bes...
Ivan Mezei, Veljko Malbasa, Ivan Stojmenovic
127
Voted
WIMOB
2008
IEEE
15 years 9 months ago
AVERT: Adaptive SerVicE and Route Discovery ProTocol for MANETs
—In the past few years there has been increasing research interest in service discovery protocols for Mobile Ad Hoc Networks (MANET). The most promising approaches so far address...
Christopher N. Ververidis, George C. Polyzos
131
Voted
INFOCOM
2007
IEEE
15 years 8 months ago
Feedforward SDL Constructions of Output-Buffered Multiplexers and Switches with Variable Length Bursts
Abstract— In this paper, we study the problem of exact emulation of two types of optical queues: (i) N-to-1 output-buffered multiplexers with variable length bursts, and (ii) N Ã...
Yi-Ting Chen, Cheng-Shang Chang, Jay Cheng, Duan-S...
IWCMC
2006
ACM
15 years 8 months ago
Effect of payload length variation and retransmissions on multimedia in 802.11a WLANs
Multimedia transmission over wireless local area networks is challenging due to the varying nature of the wireless channel as well as the inherent difference between multimedia a...
Sayantan Choudhury, Irfan Sheriff, Jerry D. Gibson...
129
Voted
BROADNETS
2005
IEEE
15 years 8 months ago
Using location information for scheduling in 802.15.3 MAC
— In recent years, UWB has received much attention as a suitable Physical Layer (PHY) for Wireless Personal Area Networks (WPANS). UWB allows for low cost, low power, high bandwi...
Sethuram Balaji Kodeswaran, Anupam Joshi