Sciweavers

644 search results - page 110 / 129
» A topological characterization of weakness
Sort
View
IMC
2010
ACM
14 years 7 months ago
Network traffic characteristics of data centers in the wild
Although there is tremendous interest in designing improved networks for data centers, very little is known about the network-level traffic characteristics of current data centers...
Theophilus Benson, Aditya Akella, David A. Maltz
MOBIHOC
2010
ACM
14 years 7 months ago
Greedy geographic routing in large-scale sensor networks: a minimum network decomposition approach
In geographic (or geometric) routing, messages are expected to route in a greedy manner: the current node always forwards a message to its neighbor node that is closest to the des...
Anne-Marie Kermarrec, Guang Tan
MOBIHOC
2010
ACM
14 years 7 months ago
Longest-queue-first scheduling under SINR interference model
We investigate the performance of longest-queue-first (LQF) scheduling (i.e., greedy maximal scheduling) for wireless networks under the SINR interference model. This interference...
Long Bao Le, Eytan Modiano, Changhee Joo, Ness B. ...
92
Voted
GLOBECOM
2010
IEEE
14 years 6 months ago
Phase Transition Diagram for Underlay Heterogeneous Cognitive Radio Networks
Abstract--Characterizing the topology and therefore fundamental limits is a must to establish effective end-to-end cognitive radio networking (CRN). However, there lacks complete u...
Weng-Chon Ao, Shin-Ming Cheng, Kwang-Cheng Chen
CDC
2010
IEEE
127views Control Systems» more  CDC 2010»
14 years 4 months ago
The wireless control network: Monitoring for malicious behavior
We consider the problem of stabilizing a plant with a network of resource constrained wireless nodes. In a companion paper, we developed a protocol where each node repeatedly trans...
Shreyas Sundaram, Miroslav Pajic, Christoforos N. ...