Sciweavers

13007 search results - page 2312 / 2602
» Wireless and Mobile Networking
Sort
View
IPPS
2005
IEEE
15 years 9 months ago
Maximizing the Lifetime of Dominating Sets
We investigate the problem of maximizing the lifetime of wireless ad hoc and sensor networks. Being battery powered, nodes in such networks have to perform their intended task und...
Thomas Moscibroda, Roger Wattenhofer
PADS
2004
ACM
15 years 9 months ago
The Effect of Detail on Ethernet Simulation
An important question for network simulation is what level of detail is required to obtain a desired level of accuracy. While in some networks, the level of detail is an open rese...
Alefiya Hussain, Aman Kapoor, John S. Heidemann
SASN
2003
ACM
15 years 9 months ago
Modeling vulnerabilities of ad hoc routing protocols
The purpose of this work is to automate the analysis of ad hoc routing protocols in the presence of attackers. To this end, a formal model of protocol behavior is developed in whi...
Shahan Yang, John S. Baras
ICC
2000
IEEE
151views Communications» more  ICC 2000»
15 years 8 months ago
Channel-Hopping Multiple Access
— The medium-access control (MAC) protocols for wireless networks proposed or implemented to date based on collision-avoidance handshakes between sender and receiver either requi...
Asimakis Tzamaloukas, J. J. Garcia-Luna-Aceves
INFOCOM
1999
IEEE
15 years 8 months ago
Accessing Multiple Mirror Sites in Parallel: Using Tornado Codes to Speed Up Downloads
Mirror sites enable client requests to be serviced by any of a number of servers, reducing load at individual servers and dispersing network load. Typically, a client requests serv...
John W. Byers, Michael Luby, Michael Mitzenmacher
« Prev « First page 2312 / 2602 Last » Next »