Sciweavers

1080 search results - page 164 / 216
» Performance analysis of the CONFIDANT protocol
Sort
View
ICC
2008
IEEE
126views Communications» more  ICC 2008»
15 years 7 months ago
Discovering Packet Structure through Lightweight Hierarchical Clustering
— The complexity of current Internet applications makes the understanding of network traffic a challenging task. By providing larger-scale aggregates for analysis, unsupervised ...
Abdulrahman Hijazi, Hajime Inoue, Ashraf Matrawy, ...
DEBS
2008
ACM
15 years 3 months ago
Replica placement for high availability in distributed stream processing systems
A significant number of emerging on-line data analysis applications require the processing of data streams, large amounts of data that get updated continuously, to generate output...
Thomas Repantis, Vana Kalogeraki
WISEC
2009
ACM
15 years 8 months ago
Towards a theory for securing time synchronization in wireless sensor networks
Time synchronization in highly distributed wireless systems like sensor and ad hoc networks is extremely important in order to maintain a consistent notion of time throughout the ...
Murtuza Jadliwala, Qi Duan, Shambhu J. Upadhyaya, ...
ICDCS
2003
IEEE
15 years 6 months ago
Collision Avoidance in Single-Channel Ad Hoc Networks Using Directional Antennas
Three collision-avoidance protocols are analyzed that use omni-directional packet reception together with omnidirectional transmissions, directional transmissions, or a combinatio...
Yu Wang, J. J. Garcia-Luna-Aceves
GLOBECOM
2008
IEEE
15 years 8 months ago
Distributed Double-Differential Orthogonal Space-Time Coding for Cooperative Networks
— In this paper, distributed double-differential coding is proposed to avoid the problem of carrier offsets in amplify and forward protocol based cooperative network with two rel...
Manav R. Bhatnagar, Are Hjørungnes