Sciweavers

1080 search results - page 195 / 216
» Performance analysis of the CONFIDANT protocol
Sort
View
INFOCOM
2011
IEEE
14 years 1 months ago
Feasibility and optimization of delay guarantees for non-homogeneous flows in IEEE 802.11 WLANs
—Due to the rapid growth of real-time applications and the ubiquity of IEEE 802.11 MAC as a layer-2 protocol for wireless local area networks (WLANs), it is of increasing interes...
Yan Gao, Chee Wei Tan, Ying Huang, Zheng Zeng, P. ...
ICDCSW
2011
IEEE
13 years 9 months ago
SenSec: A Scalable and Accurate Framework for Wireless Sensor Network Security Evaluation
—Developing secure wireless sensor networks (WSNs) is a complex process that involves careful design of attack test cases and security countermeasures, as well as meaningful eval...
Yi-Tao Wang, Rajive Bagrodia
SIGCOMM
2006
ACM
15 years 3 months ago
Minimizing churn in distributed systems
A pervasive requirement of distributed systems is to deal with churn — change in the set of participating nodes due to joins, graceful leaves, and failures. A high churn rate ca...
Brighten Godfrey, Scott Shenker, Ion Stoica
MSWIM
2009
ACM
15 years 4 months ago
The MAC unreliability problem in IEEE 802.15.4 wireless sensor networks
In recent years, the number of sensor network deployments for real-life applications has rapidly increased and it is expected to expand even more in the near future. Actually, for...
Giuseppe Anastasi, Marco Conti, Mario Di Francesco
IPSN
2009
Springer
15 years 4 months ago
Distributed resource management and matching in sensor networks
We consider a scenario in which there are resources at or near nodes of a network, which are either static (e.g. fire stations, parking spots) or mobile (e.g. police cars). Over ...
Jie Gao, Leonidas J. Guibas, Nikola Milosavljevic,...