Sciweavers

37 search results - page 3 / 8
» jnw 2006
Sort
View
JNW
2006
145views more  JNW 2006»
13 years 5 months ago
A Comparison of Replication Strategies for Reliable Decentralised Storage
Distributed hash tables (DHTs) can be used as the basis of a resilient lookup service in unstable environments: local routing tables are updated to reflected changes in the network...
Matthew Leslie, Jim Davies, Todd Huffman
JNW
2006
98views more  JNW 2006»
13 years 5 months ago
Efficient Distributed Algorithm for RWA Using Path Protection
A number of Integer Linear Program (ILP) formulations for both static and dynamic lightpath allocation have been proposed, for the design of survivable WDM networks. However, such ...
Arunita Jaekel, Ying Chen
JNW
2006
148views more  JNW 2006»
13 years 5 months ago
An Energy Efficient Approach to Dynamic Coverage in Wireless Sensor Networks
Tracking of mobile targets is an important application of sensor networks. This is a non-trivial problem as the increased accuracy of tracking results in an overall reduction in th...
Mohamed Khalil Watfa, Sesh Commuri
JNW
2006
81views more  JNW 2006»
13 years 5 months ago
Efficient 3G324M protocol Implementation for Low Bit Rate Multipoint Video Conferencing
This paper discusses an efficient design and implementation of control and multiplexing protocols H.245 and H.223, which is an important part of 3G324M protocol stack, for mobile w...
Weijia Jia, Fung Po Tso, Lizhou Zhang
JNW
2006
63views more  JNW 2006»
13 years 5 months ago
MAC Contention in a Wireless LAN with Noncooperative Anonymous Stations
In ad hoc wireless LANs populated by mutually impenetrable groups of anonymous stations, honest stations are prone to "bandwidth stealing" by selfish stations. The proble...
Jerzy Konorski