Sciweavers

TMC
2010
161views more  TMC 2010»
13 years 9 months ago
Schedule Adaptation of Low-Power-Listening Protocols for Wireless Sensor Networks
—Many recent advances in MAC protocols for wireless sensor networks have been proposed to reduce idle listening, an energy wasteful state of the radio. Low-Power-Listening (LPL) ...
Christophe J. Merlin, Wendi B. Heinzelman
TMC
2010
119views more  TMC 2010»
13 years 9 months ago
SSUM: Smart Server Update Mechanism for Maintaining Cache Consistency in Mobile Environments
—This paper proposes a cache consistency scheme based on a previously proposed architecture for caching database data in MANETs. The original scheme for data caching stores the q...
Khaleel W. Mershad, Hassan Artail
TMC
2010
178views more  TMC 2010»
13 years 9 months ago
Cost Analysis of Short Message Retransmissions
Short Message Service (SMS) is the most popular mobile data service today. In Taiwan, a subscriber sends more than 200 short messages per year on average. The huge demand for SMS ...
Sok-Ian Sou, Yi-Bing Lin, Chao-Liang Luo
TMC
2010
100views more  TMC 2010»
13 years 9 months ago
Optimal Relay Station Placement in Broadband Wireless Access Networks
—To satisfy the stringent requirement of capacity enhancement in wireless networks, cooperative relaying is envisioned as one of the most effective solutions. In this paper, we s...
Bin Lin, Pin-Han Ho, Liang-Liang Xie, Xuemin (Sher...
TMC
2010
196views more  TMC 2010»
13 years 9 months ago
Joint Routing, Channel Assignment, and Scheduling for Throughput Maximization in General Interference Models
—Throughput optimization in wireless networks with multiple channels and multiple radio interfaces per node is a challenging problem. For general traffic models (given a set of ...
Mahmoud Al-Ayyoub, Himanshu Gupta
TMC
2010
210views more  TMC 2010»
13 years 9 months ago
Exploiting Reactive Mobility for Collaborative Target Detection in Wireless Sensor Networks
—Recent years have witnessed the deployments of wireless sensor networks in a class of mission-critical applications such as object detection and tracking. These applications oft...
Rui Tan, Guoliang Xing, Jianping Wang, Hing-Cheung...
TMC
2010
151views more  TMC 2010»
13 years 9 months ago
Exploiting and Defending Opportunistic Scheduling in Cellular Data Networks
—Third Generation (3G) cellular networks take advantage of time-varying and location-dependent channel conditions of mobile users to provide broadband services. Under fairness an...
Radmilo Racic, Denys Ma, Hao Chen, Xin Liu
TMC
2010
89views more  TMC 2010»
13 years 9 months ago
SIP-Based IMS Signaling Analysis for WiMax-3G Interworking Architectures
—The third-generation partnership project (3GPP) and 3GPP2 have standardized the IP multimedia subsystem (IMS) to provide ubiquitous and access network-independent IP-based servi...
Arslan Munir, Ann Gordon-Ross
TMC
2010
137views more  TMC 2010»
13 years 9 months ago
A Metric for DISH Networks: Analysis, Implications, and Applications
—In wireless networks, node cooperation has been exploited as a data relaying mechanism for decades. However, the wireless channel allows for much richer interaction among nodes....
Tie Luo, Vikram Srinivasan, Mehul Motani
TMC
2010
193views more  TMC 2010»
13 years 9 months ago
Quantifying Impact of Mobility on Data Availability in Mobile Ad Hoc Networks
—In mobile ad hoc networks, there are many applications in which mobile users share information, e.g., collaborative rescue operations at a disaster site and exchange of word-of-...
Takahiro Hara