Sciweavers

57 search results - page 9 / 12
» comcom 2007
Sort
View
COMCOM
2007
79views more  COMCOM 2007»
13 years 9 months ago
Performance implications of a bounded receive buffer in concurrent multipath transfer
— We study the performance of Concurrent Multipath Transfer using SCTP multihoming (CMT) in the presence of a bounded receive buffer (rbuf). We demonstrate using simulation that ...
Janardhan R. Iyengar, Paul D. Amer, Randall R. Ste...
COMCOM
2007
103views more  COMCOM 2007»
13 years 9 months ago
Using event detection latency to evaluate the coverage of a wireless sensor network
A wireless sensor network (WSN) consists of many tiny and low-power devices deployed in a sensing field. One of the major tasks of a WSN is to monitor the surrounding environment...
You-Chiun Wang, Kai-Yang Cheng, Yu-Chee Tseng
COMCOM
2007
89views more  COMCOM 2007»
13 years 9 months ago
On-the-fly TCP path selection algorithm in access link load balancing
—Many enterprises install multiple access links for fault tolerance or bandwidth enlargement. Dispatching connections through good links is the ultimate goal in utilizing multipl...
Ying-Dar Lin, Shih-Chiang Tsao, Un-Pio Leong
COMCOM
2007
94views more  COMCOM 2007»
13 years 9 months ago
Adaptive backup routing for ad-hoc networks
The network topology changes frequently in ad-hoc networks. Some on-demand protocols with multi-paths or backup routes have been proposed to improve the performance in ad-hoc netw...
Wei Kuang Lai, Sheng-Yu Hsiao, Yuh-Chung Lin
COMCOM
2007
149views more  COMCOM 2007»
13 years 9 months ago
Adaptive security design with malicious node detection in cluster-based sensor networks
Distributed wireless sensor networks have problems on detecting and preventing malicious nodes, which always bring destructive threats and compromise multiple sensor nodes. Theref...
Meng-Yen Hsieh, Yueh-Min Huang, Han-Chieh Chao