Sciweavers

3751 search results - page 643 / 751
» Events in security protocols
Sort
View
VTC
2007
IEEE
15 years 4 months ago
Opportunistic Relay Selection with Limited Feedback
Abstract— It has been shown that a decentralized relay selection protocol based on opportunistic feedback from the relays yields good throughput performance in dense wireless net...
Caleb K. Lo, Robert W. Heath Jr., Sriram Vishwanat...
DCOSS
2007
Springer
15 years 4 months ago
Dwarf: Delay-aWAre Robust Forwarding for Energy-Constrained Wireless Sensor Networks
With the field of wireless sensor networks rapidly maturing, the focus shifts from “easy” deployments, like remote monitoring, to more difficult domains where applications imp...
Mario Strasser, Andreas Meier, Koen Langendoen, Ph...
MSN
2007
Springer
125views Sensor Networks» more  MSN 2007»
15 years 4 months ago
Ensuring Area Coverage in Hybrid Wireless Sensor Networks
Success of Wireless Sensor Networks largely depends whether the deployed network can provide desired coverage with acceptable network lifetime. This paper proposes a distributed pr...
Nadeem Ahmed, Salil S. Kanhere, Sanjay Jha
AINA
2006
IEEE
15 years 4 months ago
Equation Based Congestion Control for Video Transmission over WCDMA Networks
The scheme of real time streaming video is one of the newcomers in wireless data communication, raising a number of new requirements in both telecommunication and data communicati...
Antonios G. Alexiou, Dimitrios Antonellis, Christo...
GLOBECOM
2006
IEEE
15 years 4 months ago
Toward Understanding the Behavior of BGP During Large-Scale Power Outages
— While the Internet continues to thrive, the resiliency of its fundamental routing infrastructure is not fully understood. In this paper, we analyze the behavior of the de facto...
Jun Li, Zhen Wu, Eric Purpus