Sciweavers

138 search results - page 11 / 28
» Packet forwarding with source verification
Sort
View
INFOCOM
2005
IEEE
15 years 3 months ago
Non-pipelined relay improves throughput performance of wireless ad-hoc networks
—The communication model typically assumed in wireless ad-hoc networks is based on a traditional “pipelined relay” (PR) strategy. In PR, an end-to-end flow has multiple outs...
Aravind Velayutham, Karthikeyan Sundaresan, Raghup...
78
Voted
PE
2008
Springer
108views Optimization» more  PE 2008»
14 years 9 months ago
Rate-optimal schemes for Peer-to-Peer live streaming
In this paper we consider the problem of sending data in real time from information sources to sets of receivers, using peer-to-peer communications. We consider several models of ...
Laurent Massoulié, Andrew Twigg
ICIP
2006
IEEE
15 years 11 months ago
Syndrome-Based Robust Video Transmission Over Networks with Bursty Losses
This paper addresses the problem of low-latency robust video delivery over packet networks characterized by a bursty loss process. We propose a joint source-channel coding based v...
Jiajun Wang, Vinod M. Prabhakaran, Kannan Ramchand...
SASN
2006
ACM
15 years 3 months ago
Robust cooperative trust establishment for MANETs
In a mobile ad hoc network (MANET), a source node must rely on intermediate nodes to forward its packets along multihop routes to the destination node. Due to the lack of infrastr...
Charikleia Zouridaki, Brian L. Mark, Marek Hejmo, ...
MIPS
2004
Springer
121views Multimedia» more  MIPS 2004»
15 years 3 months ago
Analysis of FEC Codes for Partially Reliable Media Broadcasting Schemes
With many multimedia delivery schemes a client does not necessarily receive a given media content entirely (e.g. router congestions can lead some information to be lost). Mechanism...
Christoph Neumann, Vincent Roca