Sciweavers

88 search results - page 7 / 18
» jsac 2008
Sort
View
JSAC
2008
95views more  JSAC 2008»
13 years 9 months ago
Game Theoretic Modeling of Malicious Users in Collaborative Networks
If a network is to operate successfully, its users need to collaborate. Collaboration takes the form of following a network protocol and involves some resource expenditure on the p...
George Theodorakopoulos, John S. Baras
JSAC
2008
86views more  JSAC 2008»
13 years 9 months ago
Distributed function calculation and consensus using linear iterative strategies
Given an arbitrary network of interconnected nodes, we develop and analyze a distributed strategy that enables a subset of the nodes to calculate any given function of the node val...
Shreyas Sundaram, Christoforos N. Hadjicostis
JSAC
2008
125views more  JSAC 2008»
13 years 9 months ago
RIPT: A Receiver-Initiated Reservation-Based Protocol for Underwater Acoustic Networks
Although there are many MAC protocols that have been proposed for terrestrial wireless networks with a wide variety of aspects, these protocols cannot be applied directly in underw...
Nitthita Chirdchoo, Wee-Seng Soh, Kee Chaing Chua
JSAC
2008
114views more  JSAC 2008»
13 years 9 months ago
Design of an Optimal Bayesian Incentive Compatible Broadcast Protocol for Ad Hoc Networks with Rational Nodes
Nodes in an ad hoc wireless network incur certain costs for forwarding packets since packet forwarding consumes the resources of the nodes. If the nodes are rational, free packet f...
N. Ram Suri, Y. Narahari
JSAC
2008
125views more  JSAC 2008»
13 years 9 months ago
Nonbinary LDPC Coding for Multicarrier Underwater Acoustic Communication
Recently, multicarrier modulation in the form of orthogonal frequency division multiplexing (OFDM) has been shown feasible for underwater acoustic communications via effective algo...
Jie Huang, Shengli Zhou, Peter Willett