Sciweavers

10907 search results - page 2000 / 2182
» Constraint Based Strategies
Sort
View
TRIDENTCOM
2010
IEEE
14 years 8 months ago
G-Lab Deep: Cross-Layer Composition and Security for a Flexible Future Internet
The Internet enables the way how global businesses and communities communicate today. In the last years, however, new demands have collided with old designs, resulting in a complex...
Carsten Schmoll, Christian Henke, Dirk Hoffstadt, ...
90
Voted
WCNC
2010
IEEE
14 years 8 months ago
Channel Modeling and MIMO Capacity for Outdoor Millimeter Wave Links
Recent work has shown that mesh networks based on short-range outdoor millimeter (mm) wave links in the unlicensed 60 GHz band are a promising approach to providing an easily deplo...
Hong Zhang, Sriram Venkateswaran, Upamanyu Madhow
ICPPW
2009
IEEE
14 years 8 months ago
Improvement of Messages Delivery Time on Vehicular Delay-Tolerant Networks
Vehicular Delay-Tolerant Networks (VDTNs) are an application of the Delay-Tolerant Network (DTN) concept, where the movement of vehicles and their message relaying service is used ...
Vasco Nuno da Gama de Jesus Soares, Joel Jos&eacut...
115
Voted
JNCA
2011
137views more  JNCA 2011»
14 years 5 months ago
Providing survivability against jamming attack for multi-radio multi-channel wireless mesh networks
Built upon a shared wireless medium, wireless mesh network is particularly vulnerable to jamming attacks. The ability to recover from attacks and maintain an acceptable level of s...
Shanshan Jiang, Yuan Xue
90
Voted
TVCG
2011
198views more  TVCG 2011»
14 years 5 months ago
Forecasting Hotspots - A Predictive Analytics Approach
—Current visual analytics systems provide users with the means to explore trends in their data. Linked views and interactive displays provide insight into correlations among peop...
Ross Maciejewski, Ryan Hafen, Stephen Rudolph, Ste...
« Prev « First page 2000 / 2182 Last » Next »