Sciweavers

ICN
2005
Springer
14 years 5 months ago
Scheduling Algorithms for Input Queued Switches Using Local Search Technique
Input Queued switches have been very well studied in the recent past. The Maximum Weight Matching (MWM) algorithm is known to deliver 100% throughput under any admissible traffic. ...
Yanfeng Zheng, Simin He, Shutao Sun, Wen Gao
ICN
2005
Springer
14 years 5 months ago
An Energy Constrained Multi-hop Clustering Algorithm for Wireless Sensor Networks
A wireless sensor network is a new kind of wireless Ad-Hoc network consisting of a large number of small low cost, power constrained sensors deployed in a large area for gathering...
Navin Kumar Sharma, Mukesh Kumar
ICN
2005
Springer
14 years 6 months ago
Eliminating the Performance Anomaly of 802.11b
Abstract. In this paper, we propose a mechanism to eliminate the performance anomaly of IEEE 802.11b. Performance anomaly happens when nodes that have different transmission rates...
See-hwan Yoo, Jin-Hee Choi, Jae-Hyun Hwang, Chuck ...
ICN
2005
Springer
14 years 6 months ago
Two Energy-Efficient Routing Algorithms for Wireless Sensor Networks
: Power Conservation is one of the most important challenges in wireless sensor networks. In this paper, we present two minimum-energy routing algorithms. Our main goal is to reduc...
Hung Le Xuan, Youngku Lee, Sungyoung Lee
ICN
2005
Springer
14 years 6 months ago
Primary/Secondary Path Generation Problem: Reformulation, Solutions and Comparisons
Abstract. This paper considers the primary and secondary path generation problem in traffic engineering. We first present a standard MILP model. Since its size and integrality gap...
Quanshi Xia, Helmut Simonis
ICN
2005
Springer
14 years 6 months ago
Discovery and Routing in the HEN Heterogeneous Peer-to-Peer Network
Network infrastructures are nowadays getting more and more complex as security considerations and technical needs like network address translation are blocking traffic and protocol...
Tim Schattkowsky
ICN
2005
Springer
14 years 6 months ago
A Practical and Secure Communication Protocol in the Bounded Storage Model
Proposed by Maurer the bounded storage model has received much academic attention in the recent years. Perhaps the main reason for this attention is that the model facilitates a un...
Erkay Savas, Berk Sunar
ICN
2005
Springer
14 years 6 months ago
Packet Scheduling Across Networks of Switches
Abstract. Recent developments in computer and communication networks require scheduling decisions to be made under increasingly complex system dynamics. We model and analyze the pr...
Kevin Ross, Nicholas Bambos
ICN
2005
Springer
14 years 6 months ago
Reliable Mobile Ad Hoc P2P Data Sharing
Abstract. We developed a reliable mobile Peer-to-Peer (P2P) data sharing system and performed some experiments for verifying our routing scheme using our real testbed. Our method f...
Mee Young Sung, Jong Hyuk Lee, Jong Seung Park, Se...
ICN
2005
Springer
14 years 6 months ago
17 GHz Wireless LAN: Performance Analysis of ARQ Based Error Control Schemes
Giuseppe Razzano, Luca Cecconi, Roberto Cusani