Sciweavers

171 search results - page 28 / 35
» Jamming communication networks under complete uncertainty
Sort
View
88
Voted
INFOCOM
2008
IEEE
15 years 4 months ago
Towards a Theory of Robust Localization Against Malicious Beacon Nodes
—Localization in the presence of malicious beacon nodes is an important problem in wireless networks. Although significant progress has been made on this problem, some fundament...
Sheng Zhong, Murtuza Jadliwala, Shambhu J. Upadhya...
83
Voted
IJCNN
2008
IEEE
15 years 4 months ago
A pragmatic path toward endowing virtually-embodied AIs with human-level linguistic capability
— Current work is described wherein simplified versions of the Novamente Cognition Engine (NCE) are being used to control virtual agents in virtual worlds such as game engines an...
Ben Goertzel
92
Voted
MOBICOM
2004
ACM
15 years 3 months ago
A scalable model for channel access protocols in multihop ad hoc networks
A new modeling framework is introduced for the analytical study of medium access control (MAC) protocols operating in multihop ad hoc networks. The model takes into account the e...
Marcelo M. Carvalho, Jose Joaquin Garcia-Luna-Acev...
84
Voted
ICDCS
2010
IEEE
14 years 8 months ago
'Ethernet on AIR': Scalable Routing in very Large Ethernet-Based Networks
—Networks based on Ethernet bridging scale poorly as bridges flood the entire network repeatedly, and several schemes have been proposed to mitigate this flooding problem; howe...
Dhananjay Sampath, Suchit Agarwal, J. J. Garcia-Lu...
MOBIQUITOUS
2005
IEEE
15 years 3 months ago
PPP Migration: A Technique for Low-Latency Handoff in CDMA2000 Networks
In current CDMA2000 standard, a Packet Data Serving Node (PDSN) acts as an IP gateway to the Internet. Mobile Nodes (MN) connect to a PDSN using a Point-to-Point (PPP) session and...
Anand Kagalkar, Sarit Mukherjee, Sampath Rangaraja...