Sciweavers

177 search results - page 34 / 36
» jsac 2006
Sort
View
JSAC
2006
181views more  JSAC 2006»
13 years 9 months ago
Information theoretic framework of trust modeling and evaluation for ad hoc networks
Abstract-- The performance of ad hoc networks depends on cooperation and trust among distributed nodes. To enhance security in ad hoc networks, it is important to evaluate trustwor...
Yan Lindsay Sun, Wei Yu, Zhu Han, K. J. Ray Liu
JSAC
2006
79views more  JSAC 2006»
13 years 9 months ago
On the performance of multicarrier DS-CDMA with imperfect power control and variable spreading factors
Multicarrier direct-sequence code-division multiple access (MC-DS-CDMA) becomes an attractive technique for the future fourth-generation (4G) wireless system because it can flexibl...
Li-Chun Wang, Chih-Wen Chang
JSAC
2006
157views more  JSAC 2006»
13 years 9 months ago
Traffic grooming in path, star, and tree networks: complexity, bounds, and algorithms
We consider the problem of traffic grooming in WDM path, star, and tree networks. Traffic grooming is a variant of the well-known logical topology design, and is concerned with the...
Shu Huang, Rudra Dutta, George N. Rouskas
JSAC
2006
146views more  JSAC 2006»
13 years 9 months ago
Joint Channel Assignment and Routing for Throughput Optimization in Multiradio Wireless Mesh Networks
Multihop infrastructure wireless mesh networks offer increased reliability, coverage, and reduced equipment costs over their single-hop counterpart, wireless local area networks. E...
Mansoor Alicherry, Randeep Bhatia, Erran L. Li
JSAC
2006
112views more  JSAC 2006»
13 years 9 months ago
Performance Optimizations for Deploying VoIP Services in Mesh Networks
In the recent past, there has been a tremendous increase in the popularity of VoIP services as a result of huge growth in broadband access. The same voice-over-Internet protocol (V...
Samrat Ganguly, Vishnu Navda, Kyungtae Kim, Anand ...