Sciweavers

1677 search results - page 232 / 336
» Traffic Models for Wireless Communication Networks
Sort
View
135
Voted
CORR
2010
Springer
255views Education» more  CORR 2010»
15 years 3 months ago
Scalable Tensor Factorizations for Incomplete Data
The problem of incomplete data--i.e., data with missing or unknown values--in multi-way arrays is ubiquitous in biomedical signal processing, network traffic analysis, bibliometri...
Evrim Acar, Tamara G. Kolda, Daniel M. Dunlavy, Mo...
127
Voted
CCR
2008
75views more  CCR 2008»
15 years 3 months ago
Removing exponential backoff from TCP
The well-accepted wisdom is that TCP's exponential backoff mechanism, introduced by Jacobson 20 years ago, is essential for preserving the stability of the Internet. In this ...
Amit Mondal, Aleksandar Kuzmanovic
152
Voted
IWCMC
2006
ACM
15 years 9 months ago
TARP: trust-aware routing protocol
Security is a critical issue in a mobile ad hoc network (MANET). In most of the previous protocols security is an added layer above the routing protocol. We propose a TrustAware R...
Loay Abusalah, Ashfaq A. Khokhar, G. BenBrahim, W....
129
Voted
INFOCOM
1999
IEEE
15 years 8 months ago
User-Friendly Access Control for Public Network Ports
We are facing a growing user demand for ubiquitous Internet access. As a result, network ports and wireless LANs are becoming common in public spaces inside buildings such as loung...
Guido Appenzeller, Mema Roussopoulos, Mary Baker
171
Voted
INFOCOM
2012
IEEE
13 years 6 months ago
Achievable transmission capacity of cognitive mesh networks with different media access control
—Spectrum sharing is an emerging mechanism to resolve the conflict between the spectrum scarcity and the growing demands for the wireless broadband access. In this paper we inve...
Tao Jing, Xiuying Chen, Yan Huo, Xiuzhen Cheng