Sciweavers

5948 search results - page 1021 / 1190
» Computing Robust Counter-Strategies
Sort
View
130
Voted
ICNP
2005
IEEE
15 years 9 months ago
CONNET: Self-Controlled Access Links for Delay and Jitter Requirements
Access links are typically the bottleneck between a high bandwidth LAN and a high bandwidth IP network. Without a priori resource provisioning or reservation, this tends to have a...
Mohamed A. El-Gendy, Kang G. Shin, Hosam Fathy
123
Voted
ICNP
2005
IEEE
15 years 9 months ago
Landmark Guided Forwarding
In this paper we focus on the problems of maintaining Ad Hoc network connectivity in the presence of node mobility whilst providing globally efficient and robust routing. The com...
Menghow Lim, Adam Chesterfield, Jon Crowcroft, Jul...
131
Voted
ICNP
2005
IEEE
15 years 9 months ago
Stability and Sensitivity for Congestion Control in Wireless Networks with Time Varying Link Capacities
While extensive efforts have been devoted to providing optimization based, distributed congestion control schemes for efficient bandwidth utilization and fair allocation in both ...
Guohua Zhang, Yiyu Wu, Yonghe Liu
130
Voted
P2P
2005
IEEE
119views Communications» more  P2P 2005»
15 years 9 months ago
Search with Probabilistic Guarantees in Unstructured Peer-to-Peer Networks
Search is a fundamental service in peer-to-peer (P2P) networks. However, despite numerous research efforts, efficient algorithms for guaranteed location of shared content in unst...
Ronaldo A. Ferreira, Murali Krishna Ramanathan, As...
QSHINE
2005
IEEE
15 years 9 months ago
Cooperative-Diversity Slotted ALOHA
We propose a cooperative-diversity technique for ad hoc networks based on the decode-and-forward relaying strategy. We develop a MAC protocol based on slotted ALOHA that allows ne...
Wing-Hin Wong, John M. Shea, Tan F. Wong
« Prev « First page 1021 / 1190 Last » Next »