Sciweavers

342 search results - page 56 / 69
» queue 2008
Sort
View
MOBIHOC
2008
ACM
14 years 8 months ago
BEND: MAC-layer proactive mixing protocol for network coding in multi-hop wireless networks
We present BEND, a MAC layer solution to practical network coding in multi-hop wireless networks. It is the first exploration of the broadcasting nature of wireless channels to pr...
Jian Zhang
AINA
2008
IEEE
14 years 2 months ago
Annulling SYN Flooding Attacks with Whitelist
SYN flooding is one of classical Denial of Service (DoS) attacks abusing the TCP 3-way handshake process. This attack causes a server not to accept additional connection requests...
Tae Hyung Kim, Young-Sik Choi, Jong Kim, Sung Je H...
CDC
2008
IEEE
187views Control Systems» more  CDC 2008»
14 years 2 months ago
Controlled random access MAC for network utility maximization in wireless networks
— There has been much recent interest in protocol design for wireless networks based on maximizing a network utility function. A significant advance in recent years is the obser...
Robert J. McCabe, Nikolaos M. Freris, P. R. Kumar
CISS
2008
IEEE
14 years 2 months ago
On the energy-delay trade-off of a two-way relay network
—We consider a three node network in which a pair of nodes with stochastic arrivals communicate with each other with the help of an intermediate relay. The bi-directional nature ...
Xiang He, Aylin Yener
CLUSTER
2008
IEEE
14 years 2 months ago
Empirical-based probabilistic upper bounds for urgent computing applications
—Scientific simulation and modeling often aid in making critical decisions in such diverse fields as city planning, severe weather prediction and influenza modeling. In some o...
Nick Trebon, Peter H. Beckman