Sciweavers

116 search results - page 14 / 24
» Utility Constrained Energy Minimization In Aloha Networks
Sort
View
160
Voted
CDC
2009
IEEE
124views Control Systems» more  CDC 2009»
15 years 4 months ago
Inverse modeling for open boundary conditions in channel network
Abstract-- An inverse modeling problem for systems governed by first-order, hyperbolic partial differential equations subject to periodic forcing is investigated. The problem is de...
Qingfang Wu, Mohammad Rafiee, Andrew Tinka, Alexan...
144
Voted
MSWIM
2009
ACM
15 years 10 months ago
Medium access control for underwater acoustic sensor networks with MIMO links
The requirements of multimedia underwater monitoring applications with heterogeneous traffic demands in terms of bandwidth and end-to-end reliability are considered in this artic...
Li-Chung Kuo, Tommaso Melodia
106
Voted
ICCNMC
2005
Springer
15 years 9 months ago
Sensor Network Configuration Under Physical Attacks
— In this paper, we address a sensor network lifetime problem that maintains a certain throughput in an environment where physical node destruction is possible. While lifetime is...
Xun Wang, Wenjun Gu, Kurt Schosek, Sriram Chellapp...
126
Voted
JCO
2006
67views more  JCO 2006»
15 years 3 months ago
Resource allocation for restoration of compromised systems
Computer systems are constantly under the threats of being attacked and in many cases these attacks succeed. Today's networked systems are thus built to be intrusion tolerant....
Qunwei Zheng, Sibabrata Ray, Xiaoyan Hong
142
Voted
JCM
2010
126views more  JCM 2010»
15 years 2 months ago
Adding Redundancy to Replication in Window-aware Delay-tolerant Routing
— This paper presents a resource-efficient protocol for opportunistic routing in delay-tolerant networks (DTN). First, our approach exploits the context of mobile nodes (speed, ...
Gabriel Sandulescu, Simin Nadjm-Tehrani