Sciweavers

10625 search results - page 2099 / 2125
» Supporting delay-intolerant applications
Sort
View
MOBICOM
2004
ACM
14 years 25 days ago
Revisiting the TTL-based controlled flooding search: optimality and randomization
In this paper we consider the problem of searching for a node or an object (i.e., piece of data, ļ¬le, etc.) in a large network. Applications of this problem include searching fo...
Nicholas B. Chang, Mingyan Liu
MOBICOM
2004
ACM
14 years 25 days ago
FLSS: a fault-tolerant topology control algorithm for wireless networks
Topology control algorithms usually reduce the number of links in a wireless network, which in turn decreases the degree of connectivity. The resulting network topology is more su...
Ning Li, Jennifer C. Hou
MOBICOM
2004
ACM
14 years 25 days ago
A scalable model for channel access protocols in multihop ad hoc networks
A new modeling framework is introduced for the analytical study of medium access control (MAC) protocols operating in multihop ad hoc networks. The model takes into account the eļ...
Marcelo M. Carvalho, Jose Joaquin Garcia-Luna-Acev...
MOBICOM
2004
ACM
14 years 25 days ago
On k-coverage in a mostly sleeping sensor network
Sensor networks are often desired to last many times longer than the active lifetime of individual sensors. This is usually achieved by putting sensors to sleep for most of their ...
Santosh Kumar, Ten-Hwang Lai, József Balogh
MOBIHOC
2004
ACM
14 years 25 days ago
A message ferrying approach for data delivery in sparse mobile ad hoc networks
Mobile Ad Hoc Networks (MANETs) provide rapidly deployable and self-conļ¬guring network capacity required in many critical applications, e.g., battleļ¬elds, disaster relief and ...
Wenrui Zhao, Mostafa H. Ammar, Ellen W. Zegura
« Prev « First page 2099 / 2125 Last » Next »