Sciweavers

1808 search results - page 256 / 362
» Locality optimization in wireless applications
Sort
View
ICC
2007
IEEE
210views Communications» more  ICC 2007»
15 years 6 months ago
Dirty-Paper Coding without Channel Information at the Transmitter and Imperfect Estimation at the Receiver
—In this paper, we examine the effects of imperfect channel estimation at the receiver and no channel knowledge at the transmitter on the capacity of the fading Costa’s channel...
Pablo Piantanida, Pierre Duhamel
PEWASUN
2005
ACM
15 years 10 months ago
Three-dimensional routing in underwater acoustic sensor networks
Underwater sensor networks will find applications in oceanographic data collection, pollution monitoring, offshore exploration, disaster prevention, assisted navigation, and tact...
Dario Pompili, Tommaso Melodia
SRDS
1999
IEEE
15 years 8 months ago
An Adaptive Checkpointing Protocol to Bound Recovery Time with Message Logging
Numerous mathematical approaches have been proposed to determine the optimal checkpoint interval for minimizing total execution time of an application in the presence of failures....
Kuo-Feng Ssu, Bin Yao, W. Kent Fuchs
MOBISYS
2003
ACM
16 years 4 months ago
Energy Aware Lossless Data Compression
Wireless transmission of a bit can require over 1000 times more energy than a single 32-bit computation. It would therefore seem desirable to perform significant computation to re...
Kenneth C. Barr, Krste Asanovic
ADHOC
2007
144views more  ADHOC 2007»
15 years 4 months ago
Adaptive gossip protocols: Managing security and redundancy in dense ad hoc networks
Abstract. Many ad hoc routing algorithms rely on broadcast flooding for location discovery or, more generally, for secure routing applications. Flooding is a robust algorithm but ...
Mike Burmester, Tri Van Le, Alec Yasinsac