Sciweavers

830 search results - page 91 / 166
» Pricing-Based Control of Large Networks
Sort
View
ICC
2007
IEEE
144views Communications» more  ICC 2007»
15 years 4 months ago
On Mitigating In-band Wormhole Attacks in Mobile Ad Hoc Networks
— Colluding malicious insider nodes with no special hardware capability can use packet encapsulation and tunnelling to create bogus short-cuts (in-band wormholes) in routing path...
Xu Su, Rajendra V. Boppana
79
Voted
VTC
2007
IEEE
121views Communications» more  VTC 2007»
15 years 4 months ago
Downlink Traffic Power Characterization for Multi-Rate Wireless CDMA Data Networks
— The characterization of downlink traffic power is an important issue for the design of efficient call admission control (CAC) and radio resource management (RRM) procedures. In...
Ashraf S. Hasan Mahmoud
JSAC
2006
93views more  JSAC 2006»
14 years 9 months ago
Performance Enhancement of On-Board Communication Networks Using Outage Prediction
Abstract--A research area that has become increasingly important in recent years is that of on-board mobile communication, where users on a vehicle are connected to a local network...
Adeel Baig, Lavy Libman, Mahbub Hassan
JCIT
2010
131views more  JCIT 2010»
14 years 4 months ago
A Secure Routing Protocol for Peer-to-Peer Network
In peer-to-peer networks, it is very difficult to route query successfully, since nodes in the routing path do not always behave according to pre-established routing protocols. To...
Xu Xiang, Jianguo Chen
CDC
2010
IEEE
135views Control Systems» more  CDC 2010»
14 years 4 months ago
A simple optimal power flow model with energy storage
The integration of renewable energy generation, such as wind power, into the electric grid is difficult because of the source intermittency and the large distance between generatio...
K. Mani Chandy, Steven H. Low, Ufuk Topcu, Huan Xu