Sciweavers

5079 search results - page 165 / 1016
» Hidden-Action in Network Routing
Sort
View
COMCOM
2007
71views more  COMCOM 2007»
14 years 10 months ago
Performance evaluation of minimum interference routing in network scenarios with protection requirements
Minimum interference routing schemes are good options for achieving fewer working-path request rejections. They improve the vast majority of the current QoS routing proposals. How...
José-Luis Marzo, Eusebi Calle, Pere Vil&agr...
119
Voted
WCNC
2008
IEEE
15 years 4 months ago
Network Coding via Opportunistic Forwarding in Wireless Mesh Networks
— Network coding has been used to increase transportation capabilities in wireless mesh networks. In mesh networks, the coding opportunities depend on the co-location of multiple...
Jian Zhang, Yuanzhu Peter Chen, Ivan Marsic
92
Voted
JCM
2006
117views more  JCM 2006»
14 years 10 months ago
Routing in Multi-Channel Wireless Ad-hoc Networks: OSPF-MCDS-MC
Unghee Lee, Scott F. Midkiff, Tao Lin
76
Voted
JNSM
2006
78views more  JNSM 2006»
14 years 10 months ago
Edge-Cut Bounds on Network Coding Rates
Two bounds on network coding rates are reviewed that generalize edge-cut bounds on routing rates. The simpler bound is a bidirected cut-set bound which generalizes and improves upo...
Gerhard Kramer, Serap A. Savari
85
Voted
CLUSTER
2007
IEEE
14 years 10 months ago
Anonymous communications in the Internet
With the growth and acceptance of the Internet, there has been increased interest in maintaining anonymity in the network. Using traffic analysis, it is possible to infer who is t...
Arjan Durresi