Sciweavers

1080 search results - page 168 / 216
» Performance analysis of the CONFIDANT protocol
Sort
View
58
Voted
ISCC
2003
IEEE
15 years 2 months ago
DCMC - Delay-Constrained Multipoint Communication with Multiple Sources
Multipoint communication — simultaneous transmission from multiple sources to a group of receivers — has numerous applications on Internet. However, the problem is mainly stud...
Ayse Karaman, Hossam S. Hassanein
94
Voted
INFOCOM
2000
IEEE
15 years 2 months ago
Power Controlled Multiple Access (PCMA) in Wireless Communication Networks
—We address the issue of power-controlled shared channel access in future wireless networks supporting packetized data traffic, beyond the voice-oriented continuous traffic prima...
Nicholas Bambos, Sunil Kandukuri
71
Voted
COMCOM
2008
126views more  COMCOM 2008»
14 years 9 months ago
Hi3: An efficient and secure networking architecture for mobile hosts
The Host Identity Indirection Infrastructure (Hi3) is a networking architecture for mobile hosts, derived from the Internet Indirection Infrastructure (i3) and the Host Identity P...
Andrei Gurtov, Dmitry Korzun, Andrey Lukyanenko, P...
TCSV
2002
114views more  TCSV 2002»
14 years 9 months ago
Multicast and unicast real-time video streaming over wireless LANs
In this paper, we address the problem of real-time video streaming over wireless LANs for both unicast and multicast transmission. The wireless channel is modeled as a packet-erasu...
Abhik Majumdar, Daniel Grobe Sachs, Igor Kozintsev...
MOBIHOC
2003
ACM
15 years 9 months ago
Worst-Case optimal and average-case efficient geometric ad-hoc routing
In this paper we present GOAFR, a new geometric ad-hoc routing algorithm combining greedy and face routing. We evaluate this algorithm by both rigorous analysis and comprehensive ...
Fabian Kuhn, Roger Wattenhofer, Aaron Zollinger