Sciweavers

362 search results - page 3 / 73
» Separation principles in wireless networking
Sort
View
INFOCOM
2007
IEEE
13 years 11 months ago
Separability and Topology Control of Quasi Unit Disk Graphs
— A deep understanding of the structural properties of wireless networks is critical for evaluating the performance of network protocols and improving their designs. Many protoco...
Jianer Chen, Anxiao Jiang, Iyad A. Kanj, Ge Xia, F...
TFS
2008
93views more  TFS 2008»
13 years 5 months ago
Using Fuzzy Logic to Design Separation Function in Flocking Algorithms
Abstract--Flocking algorithms essentially consist of three components: alignment, cohesion, and separation. To track a desired trajectory, the flock center should move along the de...
Dongbing Gu, Huosheng Hu
SWARM
2010
SPRINGER
283views Optimization» more  SWARM 2010»
13 years 3 months ago
Principles and applications of swarm intelligence for adaptive routing in telecommunications networks
In the past few years there has been a lot of research on the application of swarm intelligence to the problem of adaptive routing in telecommunications networks. A large number of...
Frederick Ducatelle, Gianni A. Di Caro, Luca Maria...

Publication
124views
13 years 3 months ago
Peeling the 802.11 Onion: Separating Congestion from Physical PER
An ability to accurately classify observed packet errors according to their root cause: physical layer or MAC layer contention, in 802.11 networks, opens up many opportunities for ...
Malik Ahmad Yar Khan, Darryl Veitch
PERCOM
2006
ACM
14 years 4 months ago
RFID malware: Design principles and examples
This paper explores the concept of malware for Radio Frequency Identification (RFID) systems -- including RFID exploits, RFID worms, and RFID viruses. We present RFID malware desi...
Melanie R. Rieback, Patrick N. D. Simpson, Bruno C...