Sciweavers

1473 search results - page 258 / 295
» On Performance Modeling of Ad Hoc Routing Protocols
Sort
View
ECRTS
2007
IEEE
15 years 4 months ago
On Scheduling and Real-Time Capacity of Hexagonal Wireless Sensor Networks
Since wireless ad-hoc networks use shared communication medium, accesses to the medium must be coordinated to avoid packet collisions. Transmission scheduling algorithms allocate ...
Shashi Prabh, Tarek F. Abdelzaher
IWIA
2005
IEEE
15 years 3 months ago
A Methodology for Designing Countermeasures against Current and Future Code Injection Attacks
This paper proposes a methodology to develop countermeasures against code injection attacks, and validates the methodology by working out a specific countermeasure. This methodol...
Yves Younan, Wouter Joosen, Frank Piessens
DAM
2006
86views more  DAM 2006»
14 years 9 months ago
Sub-dominant theory in numerical taxonomy
Sub-dominant theory provides efficient tools for clustering. However it classically works only for ultrametrics and ad hoc extensions like Jardine and Sibson's 2ultrametrics....
François Brucker
ICNP
1998
IEEE
15 years 2 months ago
On Reducing the Processing Cost of On-Demand QoS Path Computation
Quality of Service (QoS) routing algorithms have become the focus of recent research due to their potential for increasing the utilization of an Integrated Services Packet Network...
George Apostolopoulos, Satish K. Tripathi
ICNP
2007
IEEE
15 years 4 months ago
Identifying High Throughput Paths in 802.11 Mesh Networks: a Model-based Approach
Abstract— We address the problem of identifying high throughput paths in 802.11 wireless mesh networks. We introduce an analytical model that accurately captures the 802.11 MAC p...
Theodoros Salonidis, Michele Garetto, A. Saha, Edw...