Sciweavers

342 search results - page 59 / 69
» queue 2008
Sort
View
ISM
2008
IEEE
104views Multimedia» more  ISM 2008»
14 years 2 months ago
Provision of Quality of Service with Router Support
The current Internet servers are susceptible to network attacks. The DDoS attacks consume the network bandwidth and degrade the services provided by the servers. This paper propos...
Hongli Luo, Mei-Ling Shyu
ITNG
2008
IEEE
14 years 2 months ago
On the Properties of System-Wide Responsive Behavior
High contention of flows is associated with unstable network behavior and unmanageable resource administration, i.e., convergence to equilibrium becomes a difficult task. In this ...
Ageliki Tsioliaridou, Vassilis Tsaoussidis
VTC
2008
IEEE
179views Communications» more  VTC 2008»
14 years 2 months ago
Relay Subset Selection in Wireless Networks Using Partial Decode-and-Forward Transmission
This paper considers the problem of selecting a subset of nodes in a two-hop wireless network to act as relays in aiding the communication between the source-destination pair. Opt...
Caleb K. Lo, Sriram Vishwanath, Robert W. Heath Jr...
WCNC
2008
IEEE
14 years 2 months ago
An Analytical Performance Model of Opportunistic Spectrum Access in a Military Environment
— In an opportunistic spectrum sharing system, secondary users equipped with cognitive radios opportunistically access spectrum that is not being used by the primary users, i.e.,...
Shensheng Tang, Brian L. Mark
WCNC
2008
IEEE
14 years 2 months ago
Analysis of Distributed Reservation Protocol for UWB-Based WPANs with ECMA-368 MAC
— The recent ECMA-368 standard specifies the use of ultra wideband (UWB) technology for high rate communications in wireless personal area networks (WPANs). This paper proposes ...
Nasim Arianpoo, Yuxia Lin, Vincent W. S. Wong, Att...