Sciweavers

1513 search results - page 76 / 303
» Fibonacci Correction Networks
Sort
View
CIIT
2007
161views Communications» more  CIIT 2007»
15 years 6 months ago
Using a two-timer scheme to detect selfish nodes in mobile ad-hoc networks
The cooperation of wireless nodes in ad hoc networks is crucial to ensure the proper working of the whole network due to the absence of infrastructure. Misbehaving nodes can drama...
H. Lui, José G. Delgado-Frias, Sirisha Medi...
132
Voted
AAAI
1996
15 years 6 months ago
Supporting Performance and Configuration Management of GTE Cellular Networks
GTE Laboratories, in cooperation with GTE Mobilnet, has developed and deployed PERFFEX (PERFormance Expert), an intelligent system for performance and configuration management of ...
Ming Tan, Carol Lafond, Gabriel Jakobson, Gary You...
COMCOM
2008
80views more  COMCOM 2008»
15 years 4 months ago
Transforming general networks into feed-forward by using turn-prohibition
The issue of breaking cycles in communication networks is an important topic for several reasons. For instance, it is required when transparent bridges are filling the forwarding ...
Juan Echagüe, Jesús E. Villadangos, Vi...
TCOM
2008
98views more  TCOM 2008»
15 years 4 months ago
Performance evaluation of multi-hop CSMA/CA networks in fading environments
The performance of multi-hop CSMA/CA networks has in most cases been evaluated via simulations, or analytically using a perfect collision channel model. Using such methods, one ca...
Duong A. Hoang, Ronald A. Iltis
TWC
2008
142views more  TWC 2008»
15 years 4 months ago
Cooperative Diversity in Interference Limited Wireless Networks
Using relays in wireless networks can potentially lead to significant capacity increases. However, within an asynchronous multi-user communication setting, relaying might cause mor...
Sam Vakil, Ben Liang