Sciweavers

1080 search results - page 148 / 216
» Performance analysis of the CONFIDANT protocol
Sort
View
TWC
2008
245views more  TWC 2008»
14 years 9 months ago
Cross-Layer Optimal Policies for Spatial Diversity Relaying in Mobile Ad Hoc Networks
In order to adapt to time-varying wireless channels, various channel-adaptive schemes have been proposed to exploit inherent spatial diversity in mobile/wireless ad hoc networks w...
Jing Ai, Alhussein A. Abouzeid, Zhenzhen Ye
ACMSE
2004
ACM
15 years 3 months ago
Recent advances in mobility modeling for mobile ad hoc network research
In this paper, we survey recent advances in mobility modeling for mobile ad hoc network research. The advances include some new mobility models and analysis of older mobility mode...
Qunwei Zheng, Xiaoyan Hong, Sibabrata Ray
CL
2007
Springer
14 years 9 months ago
A bulk-synchronous parallel process algebra
The CCS (Calculus of Communicating Systems) process algebra is a well-known formal model of synchronization and communication. It is used for the analysis of safety and liveness i...
Armelle Merlin, Gaétan Hains
MICCAI
2004
Springer
15 years 10 months ago
Solving Incrementally the Fitting and Detection Problems in fMRI Time Series
We tackle the problem of real-time statistical analysis of functional magnetic resonance imaging (fMRI) data. In a recent paper, we proposed an incremental algorithm based on the e...
Alexis Roche, Philippe Pinel, Stanislas Dehaene, J...
ADHOCNOW
2008
Springer
15 years 4 months ago
Distributed Monitoring in Ad Hoc Networks: Conformance and Security Checking
Ad hoc networks are exposed more than traditional networks to security threats due to their mobility and open architecture aspects. In addition, any dysfunction due to badly congu...
Wissam Mallouli, Bachar Wehbi, Ana R. Cavalli