Sciweavers

BROADCOM
2008
IEEE
14 years 1 months ago
Improving Video Streaming over IEEE 802.11 Mesh Networks through a Cross-Layer Design Technique
There has been a spate of interest in wireless mesh networks in recent years. The reason behind such an upsurge of interest is that wireless mesh networks are seen as enablers of u...
N. H. Moleme, M. O. Odhiambo, Anish M. Kurien
AUTONOMICS
2008
ACM
14 years 1 months ago
MWM: a map-based world model for wireless sensor networks
A prominent functionality of a Wireless Sensor Network (WSN) is environmental monitoring. For this purpose the WSN creates a model for the real world by using abstractions to pars...
Abdelmajid Khelil, Faisal Karim Shaikh, Brahim Aya...
AUTONOMICS
2007
ACM
14 years 1 months ago
Multi-hop broadcast from theory to reality: practical design for ad hoc networks
We propose a complete design for a scope limited, multihop broadcast middleware, which is adapted to the variability of the ad-hoc environment and works in unlimited ad-hoc networ...
Alaeddine El Fawal, Jean-Yves Le Boudec, Kav&eacut...
AICT
2007
IEEE
122views Communications» more  AICT 2007»
14 years 1 months ago
Towards Security Analyses of an Identity Federation Protocol for Web Services in Convergent Networks
— We describe a formal approach to the analysis of security aspects of an identity federation protocol for web services in convergent networks. This network protocol was proposed...
Maurice H. ter Beek, Corrado Moiso, Marinella Petr...
MMB
2010
Springer
153views Communications» more  MMB 2010»
14 years 1 months ago
The Total Overflow during a Busy Cycle in a Markov-Additive Finite Buffer System
We consider a finite buffer system where the buffer content moves in a Markov-additive way while it is strictly between the buffer boundaries. Upon reaching the upper boundary of t...
Lothar Breuer
MDM
2010
Springer
281views Communications» more  MDM 2010»
14 years 1 months ago
Efficient Evaluation of k-Range Nearest Neighbor Queries in Road Networks
A k-Range Nearest Neighbor (or kRNN for short) query in road networks finds the k nearest neighbors of every point on the road segments within a given query region based on the net...
Jie Bao 0003, Chi-Yin Chow, Mohamed F. Mokbel, Wei...
CNSR
2005
IEEE
210views Communications» more  CNSR 2005»
14 years 1 months ago
A Framework for Self-Management of Hybrid Wireless Networks Using Autonomic Computing Principles
The dramatic increase in the number of mobile subscribers has put a significant resource and service provisioning strain on current cellular networks in particular in terms of mu...
Chong Shen, Dirk Pesch, James Irvine
CNSR
2005
IEEE
14 years 1 months ago
An Integrated Error Control and Constrained Sequence Code Based on Multimode Coding
We present a method of integrating constrained sequence (CS) and error control (EC) codes for digital communication systems. This technique is based on multimode coding where a si...
A. Hughes, I. J. Fair
CNSR
2005
IEEE
100views Communications» more  CNSR 2005»
14 years 1 months ago
Malicious Behaviour in Content-Addressable Peer-to-Peer Networks
Distributed Hash Tables (DHTs) promise to manage huge sets of key-value pairs in a Peer-to-Peer manner. The Content-Addressable Network (CAN) is a prominent variant of DHT. A crit...
Thomas Reidemeister, Klemens Böhm, Paul A. S....
AICT
2006
IEEE
130views Communications» more  AICT 2006»
14 years 1 months ago
A Search Theoretical Approach to P2P Networks: Analysis of Learning
One of the main characteristics of the peer-to-peer systems is the highly dynamic nature of the users present in the system. In such a rapidly changing enviroment, end-user guaran...
Nazif Cihan Tas, Bedri Kamil Onur Tas