Sciweavers

ISCC
2007
IEEE
100views Communications» more  ISCC 2007»
14 years 6 months ago
A Caching Algorithm using Evolutionary Game Theory in a File-Sharing System
In a P2P file-sharing system, a node finds and retrieves its desired file. If multiple nodes cache the same file to provide others, we can achieve a file-sharing system with ...
Masahiro Sasabe, Naoki Wakamiya, Masayuki Murata
IPPS
2007
IEEE
14 years 6 months ago
A Combinatorial Analysis of Distance Reliability in Star Network
This paper addresses a constrained two-terminal reliability measure referred to as Distance Reliability (DR) between the source node u and the destination node I with the shortest...
Xiaolong Wu, Shahram Latifi, Yingtao Jiang
ICNP
2007
IEEE
14 years 6 months ago
ALARM: Anonymous Location-Aided Routing in Suspicious MANETs
— In many traditional mobile network scenarios, nodes establish communication on the basis of persistent public identities. However, in some hostile and suspicious MANET settings...
Karim M. El Defrawy, Gene Tsudik
ICDCS
2007
IEEE
14 years 6 months ago
Differentiated Data Persistence with Priority Random Linear Codes
Both peer-to-peer and sensor networks have the fundamental characteristics of node churn and failures. Peers in P2P networks are highly dynamic, whereas sensors are not dependable...
Yunfeng Lin, Baochun Li, Ben Liang
ICCCN
2007
IEEE
14 years 6 months ago
Localized detection of k-connectivity in wireless ad hoc, actuator and sensor networks
- Ad hoc, actuator and sensor wireless networks normally have critical connectivity properties before becoming fault intolerant. Existing algorithms for testing k-connectivity are ...
Milenko Jorgic, Nishith Goel, Kalai Kalaichelvan, ...
GLOBECOM
2007
IEEE
14 years 6 months ago
Constrained Stochastic Games in Wireless Networks
—We consider the situation where N nodes share a common access point. With each node i there is an associated buffer and channel state that change in time. Node i dynamically cho...
Eitan Altaian, Konstantin Avrachenkov, Nicolas Bon...
GLOBECOM
2007
IEEE
14 years 6 months ago
On the Expected Connection Lifetime and Stochastic Resilience of Wireless Multi-Hop Networks
—To understand how node mobility and Byzantine node failures affect connectivity of wireless multi-hop networks, this paper investigates resilience of geometric random graphs to ...
Fei Xing, Wenye Wang
GLOBECOM
2007
IEEE
14 years 6 months ago
The Impacts of Radio Channels and Node Mobility on Link Statistics in Mobile Ad Hoc Networks
Abstract— Understanding link statistics in mobile ad hoc networks (MANETs) is essential to design adaptive routing protocols and achieve desired network performance. While much a...
Ming Zhao 0001, Wenye Wang
COMSWARE
2007
IEEE
14 years 6 months ago
ExPLoIT: Exploiting Past Location Information and Transitivity for positioning in mobile sensor networks
— We present a novel distributed range-free technique called ExPLoIT for estimating geographical location of sensor nodes in mobile sensor networks. ExPLoIT is the rst positioning...
Christophe Baraer, Kaustubh S. Phanse, Johan Nykvi...
INFOCOM
2008
IEEE
14 years 6 months ago
On Maximizing the Lifetime of Delay-Sensitive Wireless Sensor Networks with Anycast
—Sleep-wake scheduling is an effective mechanism to prolong the lifetime of energy-constrained wireless sensor networks. However, it incurs an additional delay for packet deliver...
Joohwan Kim, Xiaojun Lin, Ness B. Shroff, Prasun S...