Sciweavers

508 search results - page 86 / 102
» Connectivity Model for Wireless Mesh Networks
Sort
View
ISCC
2008
IEEE
135views Communications» more  ISCC 2008»
15 years 8 months ago
Analysis of compressed depth and image streaming on unreliable networks
This paper explores the issues connected to the transmission of three dimensional scenes over unreliable networks such as the wireless ones. It analyzes the effect of the loss of ...
Pietro Zanuttigh, Andrea Zanella, Guido M. Cortela...
CISS
2008
IEEE
15 years 3 months ago
Client-centric fractional frequency reuse based on user cooperation in OFDMA networks
Abstract--This paper proposes client-centric fractional frequency reuse (CC-FFR) techniques for interference mitigation in OFDMA-based cellular wireless networks. In this framework...
Stefan Geirhofer, Ozgur Oyman
114
Voted
GLOBECOM
2007
IEEE
15 years 8 months ago
Two-Hop Two-Path Voice Communications Over a Mobile Ad-Hoc Network
Abstract— We consider two-hop communication of a delaysensitive, memoryless Gaussian source over two independent paths in an ad-hoc network. To capture the behavior an ad-hoc net...
Jagadeesh Balam, Jerry D. Gibson
105
Voted
ADHOCNOW
2003
Springer
15 years 7 months ago
Topology Control Problems under Symmetric and Asymmetric Power Thresholds
We consider topology control problems where the goal is to assign transmission powers to the nodes of an ad hoc network so as to induce graphs satisfying specific properties. The ...
Sven Oliver Krumke, Rui Liu, Errol L. Lloyd, Madha...
111
Voted
WMASH
2004
ACM
15 years 7 months ago
Reputation-based Wi-Fi deployment protocols and security analysis
In recent years, wireless Internet service providers (WISPs) have established thousands of WiFi hot spots in cafes, hotels and airports in order to offer to travelling Internet u...
Naouel Ben Salem, Jean-Pierre Hubaux, Markus Jakob...