Sciweavers

2419 search results - page 427 / 484
» Precise Distributed Localization Algorithms for Wireless Net...
Sort
View
MOBISYS
2007
ACM
16 years 1 months ago
Real-time deployment of multihop relays for range extension
When the range of single-hop wireless communication is limited by distance or harsh radio propagation conditions, relays can be used to extend the communication range through mult...
Michael R. Souryal, Johannes Geissbuehler, Leonard...
BDA
2007
15 years 3 months ago
PeerSum: Summary Management in P2P Systems
Sharing huge, massively distributed databases in P2P systems is inherently difficult. As the amount of stored data increases, data localization techniques become no longer suffi...
Rabab Hayek, Guillaume Raschia, Patrick Valduriez,...
OSDI
2002
ACM
16 years 2 months ago
The Effectiveness of Request Redirection on CDN Robustness
It is becoming increasingly common to construct network services using redundant resources geographically distributed across the Internet. Content Distribution Networks are a prim...
Limin Wang, Vivek S. Pai, Larry L. Peterson
MOBICOM
2003
ACM
15 years 7 months ago
MiSer: an optimal low-energy transmission strategy for IEEE 802.11a/h
Reducing the energy consumption by wireless communication devices is perhaps the most important issue in the widely-deployed and exponentially-growing IEEE 802.11 Wireless LANs (W...
Daji Qiao, Sunghyun Choi, Amit Jain, Kang G. Shin
118
Voted
ISAAC
2005
Springer
153views Algorithms» more  ISAAC 2005»
15 years 7 months ago
Network Game with Attacker and Protector Entities
Consider an information network with harmful procedures called attackers (e.g., viruses); each attacker uses a probability distribution to choose a node of the network to damage. O...
Marios Mavronicolas, Vicky G. Papadopoulou, Anna P...