Sciweavers

4052 search results - page 658 / 811
» Comparing Networks from a Data Analysis Perspective
Sort
View
117
Voted
INFOCOM
2007
IEEE
15 years 10 months ago
Broadcast Flooding Revisited: Survivability and Latency
—This paper addresses the dynamics of broadcast flooding in random wireless ad hoc networks. In particular, we study the subset of nodes covered by a flood as well as timing is...
Petteri Mannersalo, Alireza Keshavarz-Haddad, Rudo...
142
Voted
QSHINE
2005
IEEE
15 years 9 months ago
Achieving Weighted Fairness between Uplink and Downlink in IEEE 802.11 DCF-Based WLANs
In this paper, we first propose an analytical model of WLANs (Wireless LANs) with an arbitrary backoff distribution and AIFS (Arbitration Inter-Frame Space). From the analysis, we ...
Jiwoong Jeong, Sunghyun Choi, Chong-kwon Kim
145
Voted
QSHINE
2005
IEEE
15 years 9 months ago
Solving The Multi-Constrained Path Selection Problem By Using Depth First Search
An extended depth-first-search (EDFS) algorithm is proposed to solve the multi-constrained path (MCP) problem in quality-of-service (QoS) routing, which is NP-Complete when the n...
Zhenjiang Li, J. J. Garcia-Luna-Aceves
91
Voted
DEBS
2007
ACM
15 years 7 months ago
On adding replies to publish-subscribe
Recently, the publish-subscribe communication model has attracted the attention of developers as a viable alternative to traditional communication schemas, like request/reply, for...
Gianpaolo Cugola, Matteo Migliavacca, Alessandro M...
108
Voted
DCOSS
2010
Springer
15 years 5 months ago
Wireless Jamming Localization by Exploiting Nodes' Hearing Ranges
Jamming attacks are especially harmful when ensuring the dependability of wireless communication. Finding the position of a jammer will enable the network to actively exploit a wid...
Zhenhua Liu, Hongbo Liu, Wenyuan Xu, Yingying Chen