Sciweavers

4345 search results - page 570 / 869
» Temporal Constraint Networks
Sort
View
JSAC
2007
142views more  JSAC 2007»
13 years 8 months ago
Non-Cooperative Resource Competition Game by Virtual Referee in Multi-Cell OFDMA Networks
— In this paper, a distributive non-cooperative game is proposed to perform sub-channel assignment, adaptive modulation, and power control for multi-cell multi-user Orthogonal Fr...
Zhu Han, Zhu Ji, K. J. Ray Liu
TWC
2008
127views more  TWC 2008»
13 years 8 months ago
Energy-Delay Analysis of MAC Protocols in Wireless Networks
In this paper the tradeoff between energy and delay for wireless networks is studied. A network using a request-to-send (RTS) and clear-to-send (CTS) type medium access control (M...
Shih Yu Chang, Wayne E. Stark, Achilleas Anastasop...
COMCOM
2007
123views more  COMCOM 2007»
13 years 8 months ago
Heuristic and optimal techniques for light-trail assignment in optical ring WDM networks
In this paper we address the problem of constrained optimization (ILP formulation) and propose a set of heuristic algorithms for assigning light-trails [1–4,7,10] to WDM ring ne...
Ashwin Gumaste, Paparao Palacharla
CN
1999
103views more  CN 1999»
13 years 8 months ago
Topology Information Condensation in Hierarchical Networks
Inspired by the PNNI protocol of the ATM Forum, this work focuses on the problem of node aggregation within peer groups and link aggregation between peer groups. It is assumed tha...
Piet Van Mieghem
IEEECIT
2010
IEEE
13 years 6 months ago
An Authentication Framework for Wireless Sensor Networks using Identity-Based Signatures
Abstract—In Wireless Sensor Networks (WSNs), authentication is a crucial security requirement to avoid attacks against secure communication, and to mitigate DoS attacks exploitin...
Rehana Yasmin, Eike Ritter, Guilin Wang