Sciweavers

523 search results - page 63 / 105
» A simulation model for military deployment
Sort
View
CN
2007
80views more  CN 2007»
15 years 16 days ago
Receiver-centric congestion control with a misbehaving receiver: Vulnerabilities and end-point solutions
Receiver-driven TCP protocols delegate key congestion control functions to receivers. Their goal is to exploit information available only at receivers in order to improve latency ...
Aleksandar Kuzmanovic, Edward W. Knightly
122
Voted
IJWIN
2002
166views more  IJWIN 2002»
15 years 6 days ago
QoS Routing for Mesh-Based Wireless LANs
Wireless LANs with their increased data rate become an attractive technology for connecting mobile users to the Internet. Efficient deployment of wireless LANs will require the ab...
Qi Xue, Aura Ganz
124
Voted
WICON
2010
14 years 10 months ago
On Infostation Density of Vehicular Networks
Vehicle-to-Vehicle and Vehicle-to-Roadside communications are going to become an indispensable part of the modern day automotive experience. For people on the move, vehicular netwo...
Vinod Kone, Haitao Zheng, Antony I. T. Rowstron, B...
ATAL
2008
Springer
15 years 2 months ago
Engineering large-scale distributed auctions
The functional characteristics of market-based solutions are typically best observed through the medium of simulation, data-gathering and subsequent visualization. We previously d...
Peter Gradwell, Michel A. Oey, Reinier J. Timmer, ...
IPSN
2009
Springer
15 years 7 months ago
Recovering temporal integrity with Data Driven Time Synchronization
Data Driven Time Synchronization (DDTS) provides synchronization across sensors by using underlying characteristics of data collected by an embedded sensing system. We apply the c...
Martin Lukac, Paul Davis, Robert Clayton, Deborah ...