Sciweavers

4761 search results - page 655 / 953
» Performance of Protocols
Sort
View
123
Voted
CJ
2008
108views more  CJ 2008»
15 years 4 months ago
Computing with Time: From Neural Networks to Sensor Networks
This article advocates a new computing paradigm, called computing with time, that is capable of efficiently performing a certain class of computation, namely, searching in paralle...
Boleslaw K. Szymanski, Gilbert Chen
COMCOM
2008
126views more  COMCOM 2008»
15 years 4 months ago
Hi3: An efficient and secure networking architecture for mobile hosts
The Host Identity Indirection Infrastructure (Hi3) is a networking architecture for mobile hosts, derived from the Internet Indirection Infrastructure (i3) and the Host Identity P...
Andrei Gurtov, Dmitry Korzun, Andrey Lukyanenko, P...
CORR
2010
Springer
143views Education» more  CORR 2010»
15 years 4 months ago
Opportunistic Routing in Ad Hoc Networks: How many relays should there be? What rate should nodes use?
Opportunistic routing is a multi-hop routing scheme which allows for selection of the best immediately available relay. In blind opportunistic routing protocols, where transmitters...
Joseph Blomer, Nihar Jindal
CORR
2008
Springer
79views Education» more  CORR 2008»
15 years 4 months ago
A Simple Distributed Antenna Processing Scheme for Cooperative Diversity
Abstract--In this letter the performance of multiple relay channels is analyzed for the situation in which multiple antennas are deployed only at the relays. The simple repetition-...
Yijia Fan, Abdulkareem Adinoyi, John S. Thompson, ...
DSS
2008
83views more  DSS 2008»
15 years 4 months ago
Knowledge discovery for adaptive negotiation agents in e-marketplaces
Intelligent software agents are promising in improving the effectiveness of e-marketplaces for e-commerce. Although a large amount of research has been conducted to develop negoti...
Raymond Y. K. Lau, Yuefeng Li, Dawei Song, Ron Chi...