—Wireless sensor networks consist of unreliable and energy-constrained sensors connecting to each other wirelessly. As measured data may be lost due to sensor failures, maintaini...
—We propose a new approach to evaluate the ultimate performance limit of time synchronization in wireless sensor networks based on the estimation theory. In particular the lower ...
— In recent years, many high-speed congestion control (HSCC) algorithms have been proposed for utilizing network pipes with huge bandwidth-delay product (BDP), and some of them h...
—Deep space communications are an important research line in scientific community. The possibility of performing the communication between earth and other planets is an excitant ...
Floriano De Rango, Mauro Tropea, Giovanni Battista...
—The class of isotropic random walk mobility models, including Random Direction mobility model, Random Walk mobility model and Brownian motion mobility model, has been widely use...
— Scheduling algorithms assign contention probability for each link in Wireless Ad Hoc Networks and plays a key role in deciding the system performance. Recently, many lowcost di...
—An admission control algorithm should be properly designed to guarantee the Quality of Service (QoS) in wireless mesh networks (WMNs). Based on channel busyness ratio, an admiss...
—The demands for vehicular Internet access are proliferating. Access Points (APs) can be deployed along the roadside to provide wireless coverage and network access for mobile ve...
—Most research on P2P multimedia streaming assumes that users access video content sequentially and passively. Unlike P2P live streaming in which the peers start playback from th...
Changqiao Xu, Gabriel-Miro Muntean, Enda Fallon, A...