Sciweavers

5079 search results - page 905 / 1016
» Hidden-Action in Network Routing
Sort
View
SAC
2004
ACM
15 years 3 months ago
An architecture for information retrieval over semi-collaborating Peer-to-Peer networks
Peer-to-Peer (P2P) networking is aimed at exploiting the potential of widely distributed information pools and its effortless access and retrieval irrespectively of underlying net...
Iraklis A. Klampanos, Joemon M. Jose
UBIMOB
2009
ACM
225views Management» more  UBIMOB 2009»
15 years 2 months ago
Historical data storage for large scale sensor networks
Wireless sensor networks are rapidly finding their way through a plethora of new applications like precision farming and forestry, with increasing network scale, system complexit...
Loïc Petit, Abdelhamid Nafaa, Raja Jurdak
ICC
2000
IEEE
241views Communications» more  ICC 2000»
15 years 2 months ago
Power Management for Throughput Enhancement in Wireless Ad-Hoc Networks
—In this paper we introduce the notion of power management within the context of wireless ad-hoc networks. More specifically, we investigate the effects of using different trans...
Tamer A. ElBatt, Srikanth V. Krishnamurthy, Dennis...
WCNC
2010
IEEE
15 years 1 months ago
Radio Resource Management in OFDMA-Based Cellular Networks Enhanced with Fixed and Nomadic Relays
—The provision of very high data rates in a ubiquitous manner throughout the service area is a great challenge for 4G and beyond-4G wireless networks. Towards that end, the deplo...
Mohamed Salem, Abdulkareem Adinoyi, Halim Yanikome...
ACSC
2004
IEEE
15 years 1 months ago
Kerberos Assisted Authentication in Mobile Ad-hoc Networks
An ad-hoc network comprises mobile nodes that cooperate with each other using wireless connections to route both data and control packets within the network. As the low transmissi...
Asad Amir Pirzada, Chris McDonald