Sciweavers

83 search results - page 15 / 17
» ton 2010
Sort
View
TON
2010
210views more  TON 2010»
13 years 22 days ago
A New Approach to Optical Networks Security: Attack-Aware Routing and Wavelength Assignment
Abstract-- Security issues and attack management in transparent WDM (Wavelength Division Multiplexing) optical networks has become of prime importance to network operators due to t...
Nina Skorin-Kapov, J. Chen, Lena Wosinska
TON
2010
97views more  TON 2010»
13 years 22 days ago
Gradually reconfiguring virtual network topologies based on estimated traffic matrices
Traffic matrix, which is required as an input of traffic engineering (TE) methods, is difficult to be obtained directly. One possible approach to obtaining the traffic matrix is to...
Yuichi Ohsita, Takashi Miyamura, Shin'ichi Arakawa...
TON
2010
157views more  TON 2010»
13 years 22 days ago
Random Access Game and Medium Access Control Design
We study the contention/interaction among wireless nodes and med -ium access control design in game theory framework. We define a general class of games, called random access game...
Lijun Chen, Steven H. Low, John C. Doyle
TON
2010
151views more  TON 2010»
13 years 22 days ago
Measurement-Driven Guidelines for 802.11 WLAN Design
Dense deployments of WLANs suffer from increased interference and as a result, reduced capacity. There are three main functions used to improve the overall network capacity: a) in...
Ioannis Broustis, Konstantina Papagiannaki, Srikan...
TON
2010
136views more  TON 2010»
13 years 22 days ago
Distributed Opportunistic Scheduling With Two-Level Probing
Distributed opportunistic scheduling (DOS) is studied for wireless ad-hoc networks in which many links contend for the channel using random access before data transmissions. Simpl...
P. S. Chandrashekhar Thejaswi, Junshan Zhang, Man-...