Sciweavers

WOWMOM
2006
ACM
195views Multimedia» more  WOWMOM 2006»
14 years 6 months ago
Can I Add a Secure VoIP Call?
— Voice over IP is a major trend in applications for wireless networks, but even so it is not immune to the risks usually related with IP networks. Proposed solutions for VoIP se...
Arlen Nascimento, Alexandre Passito, Edjair de Sou...
VALUETOOLS
2006
ACM
111views Hardware» more  VALUETOOLS 2006»
14 years 6 months ago
Stability of multi-class queueing systems with state-dependent service rates
We examine the stability of multi-class queueing systems with the special feature that the service rates of the various classes depend on the number of users present of each of th...
Matthieu Jonckheere, Sem C. Borst
PEWASUN
2006
ACM
14 years 6 months ago
Analytical modeling of random waypoint mobility patterns
Mobility, in its various forms, is one of the sources of several technical challenges being addressed in the last years to achieve a more flexible computing and communication inf...
Fábio Delamare, Fernando Luís Dotti,...
PEWASUN
2006
ACM
14 years 6 months ago
Wave propagation using the photon path map
In wireless network planning, much effort is spent on the improvement of the network and transport layer – especially for Mobile Ad Hoc Networks. Although in principle realworl...
Arne Schmitz, Leif Kobbelt
PEWASUN
2006
ACM
14 years 6 months ago
End-to-end performance characteristics in energy-aware wireless sensor networks
In this paper, we study end-to-end performance characteristics of S-MAC, an energy-aware medium access control (MAC) protocol for wireless sensor networks (WSN). WSNs are composed...
Feng Chen, Falko Dressler, Armin Heindl
PEWASUN
2006
ACM
14 years 6 months ago
Describing MANETS: principal component analysis of sparse mobility traces
Hector D. Flores, Stephan Eidenbenz, Rudolf H. Rie...
PEWASUN
2006
ACM
14 years 6 months ago
Experimental analysis of a transport protocol for ad hoc networks (TPA)
Many previous papers have pointed out that TCP performance in multi-hop ad hoc networks is not optimal. This is due to several TCP design principles that reflect the characteristi...
Giuseppe Anastasi, Emilio Ancillotti, Marco Conti,...
PEWASUN
2006
ACM
14 years 6 months ago
Performance evaluation of backoff algorithms in 802.11 ad-hoc networks
Understanding the performance of backoff algorithms in multihop ad hoc networks is a key feature to design efficient Medium Access Protocols for wireless networks. The 802.11 bac...
Tahiry Razafindralambo, Fabrice Valois
PEWASUN
2006
ACM
14 years 6 months ago
Coordinated data aggregation in wireless sensor networks using the Omega failure detector
We present an algorithm implementing the failure detector class omega (Ω) in the crash-recovery model to coordinate data aggregation in wireless sensor networks. In order to mini...
Mikel Larrea, Cristian Martín, José ...