Sciweavers

1080 search results - page 27 / 216
» Performance analysis of the CONFIDANT protocol
Sort
View
IWCMC
2006
ACM
15 years 5 months ago
TARP: trust-aware routing protocol
Security is a critical issue in a mobile ad hoc network (MANET). In most of the previous protocols security is an added layer above the routing protocol. We propose a TrustAware R...
Loay Abusalah, Ashfaq A. Khokhar, G. BenBrahim, W....
JMM2
2007
102views more  JMM2 2007»
14 years 11 months ago
A Three-Dimensional Spatiotemporal Template for Interactive Human Motion Analysis
—This paper describes a new three-dimensional spatiotemporal template, namely the Volumetric Motion History Image (VMHI), for the purpose of human motion analysis. Irregularities...
Alexandra Branzan Albu, Trevor Beugeling
JCIT
2010
146views more  JCIT 2010»
14 years 6 months ago
Determing Performance of Choreography-based Composite Services
Web Service Choreography Description Language is a main-stream standard for the description of peer-to-peer collaborations for the participants for service composition. To predict...
Yunni Xia, Zhe Ouyang, Yanxin Wu, Ruilong Yang
GLOBECOM
2006
IEEE
15 years 5 months ago
Performance Analysis of Distributed Source Coding and Packet Aggregation in Wireless Sensor Networks
— In this paper, we propose a theoretical setup for evaluation of energy efficiency of wireless sensor networks (WSNs) with distributed source coding (DSC) algorithms and packet...
L. Di Paolo, Carlo Fischione, Carlo Graziosi, Fort...
TWC
2008
87views more  TWC 2008»
14 years 11 months ago
A token-based scheduling scheme for WLANs supporting voice/data traffic and its performance analysis
Most of the existing medium access control (MAC) protocols for wireless local area networks (WLANs) provide prioritized access by adjusting the contention window sizes or interfram...
Ping Wang, Weihua Zhuang