Sciweavers

523 search results - page 75 / 105
» A simulation model for military deployment
Sort
View
WIOPT
2005
IEEE
15 years 6 months ago
Interference Power Sum with Log-Normal Components in Ad-Hoc and Sensor Networks
The log-normal shadowing radio model has frequently been used to model radio propagation conditions. There exist accurate calculation methods for estimation of interference power ...
Ramin Hekmat, Piet Van Mieghem
HASE
2008
IEEE
15 years 19 days ago
Aiding Modular Design and Verification of Safety-Critical Time-Triggered Systems by Use of Executable Formal Specifications
Designing safety-critical systems is a complex process, and especially when the design is carried out at different f abstraction where the correctness of the design at one level i...
Kohei Sakurai, Péter Bokor, Neeraj Suri
108
Voted
IAJIT
2008
134views more  IAJIT 2008»
15 years 16 days ago
A Dynamic Traffic Shaping Technique for a Scalable QoS in ATM Networks
: Traffic shaping function becomes imperative for the new broadband services that are being deployed in order to avoid information loss, to provide the end users multiple traffic o...
Francis Joseph Ogwu, Mohammad Talib, Ganiyu Aderou...
127
Voted
WINET
2010
147views more  WINET 2010»
14 years 11 months ago
Hybrid trust and reputation management for sensor networks
Wireless sensor networks are characterised by the distributed nature of their operation and the resource constraints on the nodes. Trust management schemes that are targeted at sen...
Efthimia Aivaloglou, Stefanos Gritzalis
120
Voted
TMM
2011
160views more  TMM 2011»
14 years 7 months ago
Routing-Aware Multiple Description Video Coding Over Mobile Ad-Hoc Networks
Abstract—Supporting video transmission over error-prone mobile ad-hoc networks is becoming increasingly important as these networks become more widely deployed. We propose a rout...
Yiting Liao, Jerry D. Gibson