Sciweavers

5079 search results - page 889 / 1016
» Hidden-Action in Network Routing
Sort
View
VLDB
2007
ACM
169views Database» more  VLDB 2007»
15 years 10 months ago
Peer-to-Peer Similarity Search in Metric Spaces
This paper addresses the efficient processing of similarity queries in metric spaces, where data is horizontally distributed across a P2P network. The proposed approach does not r...
Christos Doulkeridis, Akrivi Vlachou, Yannis Kotid...
EWSN
2004
Springer
15 years 9 months ago
Improving the Energy Efficiency of Directed Diffusion Using Passive Clustering
Directed diffusion is a prominent example of data-centric routing based on application layer data and purely local interactions. In its functioning it relies heavily on network-wid...
Andreas Köpke, Christian Frank, Holger Karl, ...
EIT
2008
IEEE
15 years 4 months ago
Defending selective forwarding attacks in WMNs
—Wireless Mesh Networks (WMNs) have emerged recently as a promising technology for next-generation wireless networking to provide wide variety of applications that cannot be supp...
Devu Manikantan Shila, Tricha Anjali
CISS
2007
IEEE
15 years 4 months ago
System-Level Performance of Cellular Multihop Relaying with Multiuser Scheduling
— Multihop relaying in cellular networks is seen as a viable strategy to address the need for higher data rates and better coverage. In this paper, we analyze the system-level pe...
Mohamad Charafeddine, Ozgur Oyman, Sumeet Sandhu
95
Voted
ICC
2007
IEEE
15 years 4 months ago
A Mobility Scheme for Personal and Terminal Mobility
Abstract— An IP mobility support protocol that enables personal and terminal mobility for IP-based applications is put forward. This protocol does not require new network entitie...
Bu-Sung Lee, Teck Meng Lim, Chai Kiat Yeo, Quang V...