Sciweavers

1080 search results - page 158 / 216
» Performance analysis of the CONFIDANT protocol
Sort
View
MST
2010
155views more  MST 2010»
14 years 4 months ago
Stochastic Models and Adaptive Algorithms for Energy Balance in Sensor Networks
We consider the important problem of energy balanced data propagation in wireless sensor networks and we extend and generalize previous works by allowing adaptive energy assignment...
Pierre Leone, Sotiris E. Nikoletseas, José ...
MSWIM
2009
ACM
15 years 4 months ago
HUBCODE: message forwarding using hub-based network coding in delay tolerant networks
Most people-centric delay tolerant networks have been shown to exhibit power-law behavior. Analysis of the temporal connectivity graph of such networks reveals the existence of hu...
Shabbir Ahmed, Salil S. Kanhere
GLOBECOM
2009
IEEE
15 years 4 months ago
An Auction-Based Incentive Mechanism for Non-Altruistic Cooperative ARQ via Spectrum-Leasing
— We propose and analyze a novel decentralized mechanism that motivates otherwise non-cooperative stations to participate as relays in cooperative ARQ protocol. Cooperation incen...
Igor Stanojev, Osvaldo Simeone, Umberto Spagnolini...
P2P
2009
IEEE
167views Communications» more  P2P 2009»
15 years 4 months ago
ID Repetition in Kad
ID uniqueness is essential in DHT-based systems as peer lookup and resource searching rely on IDmatching. Many previous works and measurements on Kad do not take into account that...
Jie Yu, Chengfang Fang, Jia Xu, Ee-Chien Chang, Zh...
ICRA
2009
IEEE
197views Robotics» more  ICRA 2009»
15 years 4 months ago
Synchronous EEG brain-actuated wheelchair with automated navigation
Abstract— This paper describes a new non-invasive brainactuated wheelchair that relies on a P300 neurophysiological protocol and automated navigation. In operation, the subject f...
Iñaki Iturrate, Javier M. Antelis, Javier M...