Sciweavers

2234 search results - page 38 / 447
» Protocol Implementation Using Integrated Layer Processing
Sort
View
EJWCN
2011
77views more  EJWCN 2011»
14 years 6 months ago
Emulating Opportunistic Networks with KauNet Triggers
In opportunistic networks the availability of an end-to-end path is no longer required. Instead opportunistic networks may take advantage of temporary connectivity opportunities. ...
Tanguy Pérennou, Anna Brunstrom, Tomas Hall...
ICC
2009
IEEE
130views Communications» more  ICC 2009»
15 years 6 months ago
Fast Power Control for Cross-Layer Optimal Resource Allocation in DS-CDMA Wireless Networks
—This paper presents a novel cross-layer design for joint power and end-to-end rate control optimization in DSCDMA wireless networks, along with a detailed implementation and eva...
Marco Belleschi, Lapo Balucanti, Pablo Soldati, Mi...
BROADBAND
1998
15 years 17 days ago
Multipath FEC scheme for the ATM adaptation layer AAL5
One approach to facilitate statistical multiplexing of bursty sources in ATM networks is dispersion of the traffic over independent paths. It has been shown within the literature ...
Georg Carle, Stefan Dresler, Jochen H. Schiller
USENIX
1990
15 years 11 days ago
Implementation of the Ficus Replicated File System
As we approach nation-wide integration of computer systems, it is clear that le replication will play a key role, both to improve data availability in the face of failures, and to...
Richard G. Guy, John S. Heidemann, Wai-Kei Mak, Th...
INFOCOM
2009
IEEE
15 years 5 months ago
PHY Aided MAC - A New Paradigm
—Network protocols have traditionally been designed using a layered method in part because it is easier to implement some portions of network protocols in software and other port...
Dola Saha, Aveek Dutta, Dirk Grunwald, Douglas C. ...