Sciweavers

1080 search results - page 146 / 216
» Performance analysis of the CONFIDANT protocol
Sort
View
CORR
2010
Springer
154views Education» more  CORR 2010»
14 years 9 months ago
Cross Layer Aware Adaptive MAC based on Knowledge Based Reasoning for Cognitive Radio Computer Networks
: In this paper we are proposing a new concept in MAC layer protocol design for Cognitive radio by combining information held by physical layer and MAC layer with analytical engine...
Vibhar Pathak, Krishna Chandra Roy, Santosh Kumar ...
FGCS
2008
147views more  FGCS 2008»
14 years 9 months ago
QoS-based dissemination of content in Grids
This paper proposes a bio-inspired approach tailored to the construction of a Grid information system in which content, specifically metadata descriptors that specify the characte...
Agostino Forestiero, Carlo Mastroianni, Giandomeni...
COMCOM
2006
101views more  COMCOM 2006»
14 years 9 months ago
A combined group/tree approach for scalable many-to-many reliable multicast
Abstract--In this paper we present the design, implementation, and performance analysis of Group-Aided Multicast (GAM), a scalable many-tomany reliable multicast transport protocol...
Wonyong Yoon, Dongman Lee, Hee Yong Youn, Seung-Ik...
TPDS
2008
231views more  TPDS 2008»
14 years 9 months ago
Anonymous Geo-Forwarding in MANETs through Location Cloaking
In this paper, we address the problem of destination anonymity for applications in mobile ad hoc networks where geographic information is ready for use in both ad hoc routing and I...
Xiaoxin Wu, Jun Liu, Xiaoyan Hong, Elisa Bertino
MSWIM
2005
ACM
15 years 3 months ago
Adaptive transmission opportunity with admission control for IEEE 802.11e networks
The increase of IEEE 802.11’s bandwidth led to a deployment of many multimedia applications over wireless networks. Nevertheless, these applications impose stringent constraints...
Adlen Ksentini, Abdelhak Guéroui, Mohamed N...