Sciweavers

LCN
2008
IEEE
13 years 11 months ago
Key revocation based on Dirichlet multinomial model for mobile ad hoc networks
— The absence of an online trusted authority makes the issue of key revocation in mobile ad hoc networks (MANETs) particularly challenging. In this paper, we present a novel self...
Xinxin Fan, Guang Gong
LCN
2008
IEEE
13 years 11 months ago
An analysis on error servers for stochastic network calculus
—Network calculus is a recently developed theory dealing with queuing systems found in computer networks with focus on service guarantee analysis. In the current network calculus...
Jing Xie, Yuming Jiang
LCN
2008
IEEE
13 years 11 months ago
Analysis and evaluation of a scalable QoS device for broadband access to multimedia services
—This paper presents the initial evaluation of a novel network device being located in edge nodes. It provides relaxed QoS guarantees to certain flows on a congested link by foc...
Wenyu Zhu, Thomas Dreibholz, Erwin P. Rathgeb
LCN
2008
IEEE
13 years 11 months ago
Energy efficient Ethernet encodings
Yanpei Chen, Tracy Xiaoxiao Wang, Randy H. Katz
LCN
2008
IEEE
13 years 11 months ago
Delay constrained placement of mobile data collectors in underwater acoustic sensor networks
—We propose a scheme for routing and placement of mobile data collectors in Underwater Acoustic Sensor Networks (UASNs). The proposed scheme maximizes the lifetime of the network...
Waleed Alsalih, Hossam S. Hassanein, Selim G. Akl
LCN
2008
IEEE
13 years 11 months ago
Efficient power management for Wireless Sensor Networks: A data-driven approach
—Providing energy-efficient continuous data collection services is of paramount importance to Wireless Sensor Network (WSN) applications. This paper proposes a new power manageme...
MingJian Tang, Jinli Cao, Xiaohua Jia
LCN
2008
IEEE
13 years 11 months ago
Speedo: Realistic achievable bandwidth in 802.11 through passive monitoring
—End to end available bandwidth is often constrained by IEEE 802.11 hops in the access network. Available bandwidth measurement is particularly challenging in the wireless enviro...
Malik Ahmad Yar Khan, Darryl Veitch
LCN
2008
IEEE
13 years 11 months ago
Reducing network cost of many-to-many communication in unidirectional WDM rings with network coding
—In this paper we address the problem of traffic grooming in WDM rings with all-to-all and its generalization to many-to-many service by using network coding. We consider minimi...
Long Long, Ahmed E. Kamal
LCN
2008
IEEE
13 years 11 months ago
Range queries and load balancing in a hierarchically structured P2P system
—Structured Peer-to-Peer (P2P) systems are highly scalable, self-organizing, and support efficient lookups. Furthermore, Distributed Hash Tables (DHTs), due to their features, a...
Simon Rieche, Bui The Vinh, Klaus Wehrle
LCN
2008
IEEE
13 years 11 months ago
Modeling of multi-resolution active network measurement time-series
Abstract—Active measurements on network paths provide endto-end network health status in terms of metrics such as bandwidth, delay, jitter and loss. Hence, they are increasingly ...
Prasad Calyam, Ananth Devulapalli