Sciweavers

1080 search results - page 51 / 216
» Performance analysis of the CONFIDANT protocol
Sort
View
100
Voted
IWCMC
2006
ACM
15 years 4 months ago
Cross-layer performance analysis of joint rate and power adaptation schemes with multiple-user contention in Nakagami fading cha
Adaptively adjusting transmission rate and power to concurrently enhance goodput and save energy is an important issue in the wireless local area network (WLAN). However, goodput ...
Li-Chun Wang, Kuang-Nan Yen, Jane-Hwa Huang, Ander...
BMCBI
2007
147views more  BMCBI 2007»
14 years 10 months ago
Statistical analysis and significance testing of serial analysis of gene expression data using a Poisson mixture model
Background: Serial analysis of gene expression (SAGE) is used to obtain quantitative snapshots of the transcriptome. These profiles are count-based and are assumed to follow a Bin...
Scott D. Zuyderduyn
ICUIMC
2011
ACM
14 years 1 months ago
Overhead analysis of query localization optimization and routing
Query localization is an improved extension of on-demand routing protocols for ad hoc networks. It makes use of prior routing histories to localize the query flood to a limited re...
Wenzheng Xu, Yongmin Zhang, Weifa Liang
ICCS
2004
Springer
15 years 3 months ago
A Real-Time Total Order Multicast Protocol
Abstract. We describe, analyze and submit results of a real-time total order multicast protocol developed on a distributed real-time system architecture that consists of hierarchic...
Kayhan Erciyes, Ahmet Sahan
NOMS
2006
IEEE
156views Communications» more  NOMS 2006»
15 years 4 months ago
An Integrated Solution to Protect Link State Routing against Faulty Intermediate Routers
— The importance of the routers in the network and the vulnerability in the nature of the link state routing protocol highlight the necessity of effective routing protection agai...
He Huang, Shyhtsun Felix Wu