Sciweavers

908 search results - page 174 / 182
» Modeling vulnerabilities of ad hoc routing protocols
Sort
View
ICC
2000
IEEE
137views Communications» more  ICC 2000»
15 years 1 months ago
Internet QoS Routing with IP Telephony and TCP Traffic
— In this paper, we propose the use of QoS routing to enhance the support of IP Telephony. Our proposed scheme is based on QoS intradomain OSPF routing, an extension of the conve...
Alex Dubrovsky, Mario Gerla, Scott Seongwook Lee, ...
WINET
2011
14 years 4 months ago
Sleep scheduling with expected common coverage in wireless sensor networks
Sleep scheduling, which is putting some sensor nodes into sleep mode without harming network functionality, is a common method to reduce energy consumption in dense wireless sensor...
Eyuphan Bulut, Ibrahim Korpeoglu
EMSOFT
2001
Springer
15 years 1 months ago
A Network-Centric Approach to Embedded Software for Tiny Devices
The ability to incorporate low-power, wireless communication into embedded devices gives rise to a new genre of embedded software that is distributed, dynamic, and adaptive. This p...
David E. Culler, Jason L. Hill, Philip Buonadonna,...
HPDC
1997
IEEE
15 years 1 months ago
A Directory Service for Configuring High-Performance Distributed Computations
High-performance execution in distributed computing environments often requires careful selection and configuration not only of computers, networks, and other resources but also o...
Steven Fitzgerald, Ian T. Foster, Carl Kesselman, ...
86
Voted
MOBICOM
2006
ACM
15 years 3 months ago
Characterizing multi-way interference in wireless mesh networks
Wireless mesh networks (WMNs) have been proposed as a solution for ubiquitous last-mile broadband access. A critical limiting factor for many WMN protocols in realizing their thro...
Saumitra M. Das, Dimitrios Koutsonikolas, Y. Charl...