Sciweavers

16128 search results - page 2844 / 3226
» Distributed network scheduling
Sort
View
VTC
2010
IEEE
157views Communications» more  VTC 2010»
15 years 2 months ago
Cross-Layer Solutions for Cooperative Medium Access Control Protocols
— Recent studies have shown that designing a Medium Access Control (MAC) protocol combined with a cooperative approach may improve the attainable network throughput, despite redu...
Alessandro Crismani, Fulvio Babich, Lajos Hanzo
GLOBECOM
2010
IEEE
15 years 2 months ago
GreenCloud: A Packet-Level Simulator of Energy-Aware Cloud Computing Data Centers
Cloud computing data centers are becoming increasingly popular for the provisioning of computing resources. The cost and operating expenses of data centers have skyrocketed with th...
Dzmitry Kliazovich, Pascal Bouvry, Yury Audzevich,...
INFOCOM
2010
IEEE
15 years 2 months ago
Multi-Round Sensor Deployment for Guaranteed Barrier Coverage
Abstract--Deploying wireless sensor networks to provide guaranteed barrier coverage is critical for many sensor networks applications such as intrusion detection and border surveil...
Guanqun Yang, Daji Qiao
MOBIHOC
2010
ACM
15 years 2 months ago
Detecting intra-room mobility with signal strength descriptors
We explore the problem of detecting whether a device has moved within a room. Our approach relies on comparing summaries of received signal strength measurements over time, which ...
Konstantinos Kleisouris, Bernhard Firner, Richard ...
P2P
2010
IEEE
127views Communications» more  P2P 2010»
15 years 2 months ago
Waiting for Anonymity: Understanding Delays in the Tor Overlay
Although Tor is the most widely used overlay for providing anonymity services, its users often experience very high delays. Because much of Tor usage is for Web applications, which...
Prithula Dhungel, Moritz Steiner, Ivinko Rimac, Vo...
« Prev « First page 2844 / 3226 Last » Next »