—The communication model typically assumed in wireless ad-hoc networks is based on a traditional “pipelined relay” (PR) strategy. In PR, an end-to-end flow has multiple outs...
Abstract-- We identify an analytical expression for the distortion of a scalable video bitstream containing a Base Layer (BL) and one or more Enhancement Layer (EL) bitstreams. Con...
In this paper, we study the problem of indexing multidimensional data in the P2P networks based on distributed hash tables (DHTs). We identify several design issues and propose a ...
: A newly emerging protocol for storage networking, iSCSI [1,2], was recently ratified by the Internet Engineering Task Force [3]. The iSCSI protocol is perceived as a low cost alt...
There are many applications of large scale sensor networks in which both the stimulus and the data collection stations are mobile (i.e. animal tracking, battlefield chasing). TTDD ...
Hong Zhou, Lu Jin, Zhongwei Zhang, Hesham H. Ali, ...