Sciweavers

6677 search results - page 538 / 1336
» Distributed Simulation of MAS
Sort
View
ICC
2009
IEEE
190views Communications» more  ICC 2009»
15 years 11 months ago
Decomposition for Low-Complexity Near-Optimal Routing in Multi-Hop Wireless Networks
Abstract—Network flow models serve as a popular mathematical framework for the analysis and optimization of Multi-hop Wireless Networks. They also serve to provide the understan...
Vinay Kolar, Nael B. Abu-Ghazaleh, Petri Mäh&...
ICC
2009
IEEE
15 years 11 months ago
A Laplace Transform-Based Method to Stochastic Path Finding
—Finding the most likely path satisfying a requested additive Quality-of-Service (QoS) value, such as delay, when link metrics are defined as random variables by known probabili...
Suleyman Uludag, Ziyneti Elif Uludag, Klara Nahrst...
132
Voted
ICC
2008
IEEE
124views Communications» more  ICC 2008»
15 years 11 months ago
Sidewalk: A RFID Tag Anti-Collision Algorithm Exploiting Sequential Arrangements of Tags
Abstract—Although predicting the RFID tag distribution before a read cycle begins would be generally difficult and even futile, a likely and interesting scenario is where the ta...
Hyunho Koh, Sangki Yun, Hyogon Kim
ICMCS
2007
IEEE
123views Multimedia» more  ICMCS 2007»
15 years 11 months ago
BOPPER: Wireless Video Broadcasting with Peer-to-Peer Error Recovery
Wireless digital video broadcasting has experienced much success in recent years with some industrial systems deployed. We study in this paper how to recover lost packets in video...
Shenjie Li, S.-H. Gary Chan
ICPP
2007
IEEE
15 years 11 months ago
Defending P2Ps from Overlay Flooding-based DDoS
A flooding-based search mechanism is often used in unstructured P2P systems. Although a flooding-based search mechanism is simple and easy to implement, it is vulnerable to overla...
Yunhao Liu, Xiaomei Liu, Chen Wang, Li Xiao