Sciweavers

1639 search results - page 227 / 328
» Degree-constrained network flows
Sort
View
106
Voted
CDC
2008
IEEE
166views Control Systems» more  CDC 2008»
15 years 2 months ago
Distributed coverage verification in sensor networks without location information
In this paper, we present a series of distributed algorithms for coverage verification in sensor networks with no location information. We demonstrate how, in the absence of locali...
Alireza Tahbaz-Salehi, Ali Jadbabaie
CISS
2008
IEEE
15 years 2 months ago
Cross-layer multicommodity capacity expansion on ad hoc wireless networks of cognitive radios
Cognitive radios permit dynamic control of physical layer resources such as transmission power and constellation size; these degrees of freedom can be employed to achieve significa...
Alex Fridman, Steven Weber, Kapil R. Dandekar, Mos...
IJNM
2008
112views more  IJNM 2008»
15 years 22 days ago
How to avoid packet droppers with proactive routing protocols for ad hoc networks
Routing protocols for mobile ad hoc networks (MANETs) have been an active area of research for the last decade, with many very interesting potential as well as actual applications...
Ignacy Gawedzki, Khaldoun Al Agha
CCE
2007
15 years 22 days ago
Water networks security: A two-stage mixed-integer stochastic program for sensor placement under uncertainty
This work describes a stochastic approach for the optimal placement of sensors in municipal water networks to detect maliciously injected contaminants. The model minimizes the exp...
Vicente Rico-Ramírez, Sergio Frausto-Hern&a...
TMC
2008
152views more  TMC 2008»
15 years 19 days ago
Improving TCP/IP Performance over Third-Generation Wireless Networks
As third generation (3G) wireless networks with high data rate get widely deployed, optimizing TCP performance over these networks would have a broad and significant impact on data...
Mun Choon Chan, Ramachandran Ramjee