Sciweavers

508 search results - page 86 / 102
» Connectivity Model for Wireless Mesh Networks
Sort
View
ISCC
2008
IEEE
135views Communications» more  ISCC 2008»
15 years 10 months ago
Analysis of compressed depth and image streaming on unreliable networks
This paper explores the issues connected to the transmission of three dimensional scenes over unreliable networks such as the wireless ones. It analyzes the effect of the loss of ...
Pietro Zanuttigh, Andrea Zanella, Guido M. Cortela...
CISS
2008
IEEE
15 years 5 months ago
Client-centric fractional frequency reuse based on user cooperation in OFDMA networks
Abstract--This paper proposes client-centric fractional frequency reuse (CC-FFR) techniques for interference mitigation in OFDMA-based cellular wireless networks. In this framework...
Stefan Geirhofer, Ozgur Oyman
GLOBECOM
2007
IEEE
15 years 10 months ago
Two-Hop Two-Path Voice Communications Over a Mobile Ad-Hoc Network
Abstract— We consider two-hop communication of a delaysensitive, memoryless Gaussian source over two independent paths in an ad-hoc network. To capture the behavior an ad-hoc net...
Jagadeesh Balam, Jerry D. Gibson
124
Voted
ADHOCNOW
2003
Springer
15 years 9 months ago
Topology Control Problems under Symmetric and Asymmetric Power Thresholds
We consider topology control problems where the goal is to assign transmission powers to the nodes of an ad hoc network so as to induce graphs satisfying specific properties. The ...
Sven Oliver Krumke, Rui Liu, Errol L. Lloyd, Madha...
135
Voted
WMASH
2004
ACM
15 years 9 months ago
Reputation-based Wi-Fi deployment protocols and security analysis
In recent years, wireless Internet service providers (WISPs) have established thousands of WiFi hot spots in cafes, hotels and airports in order to offer to travelling Internet u...
Naouel Ben Salem, Jean-Pierre Hubaux, Markus Jakob...