126
click to vote
PE
14 years 9 months ago
2006 Springer
Malicious nodes in a mobile and wireless ad hoc network can be a threat to the security and/or anonymity of the exchanged data. While data encryption can protect the content excha...
104
click to vote
PE
14 years 9 months ago
2006 Springer
Existing wireless networks usually provide multiple data transmission rates. This paper presents a simulation study on the performance of multiple-rate mobile ad hoc networks (MAN...
PE
14 years 9 months ago
2006 Springer
Approximating general distributions by phase-type (PH) distributions is a popular technique in stochastic analysis, since the Markovian property of PH distributions often allows a...
PE
14 years 9 months ago
2006 Springer
In this paper, the manufacturing blocking system (MBS) is studied from the Network Calculus (NetCal) perspective. By dominating an MBS by a window flow controller (WFC), we obtain...
PE
14 years 9 months ago
2006 Springer
This paper proposes a stochastic fluid flow model to compute the transfer time distribution of resources in peer-to-peer file sharing applications. The amount of bytes transferred...
|