Sciweavers

674 search results - page 120 / 135
» Scalable simulation of complex network routing policies
Sort
View
MONET
2008
77views more  MONET 2008»
14 years 9 months ago
On Relay Node Placement and Assignment for Two-tiered Wireless Networks
Wireless networks that operate on batteries are imposed with energy constraints and long distance communications between nodes are not desirable. Implementing Relay Nodes (RNs) can...
Wenxuan Guo, Xin-Ming Huang, Wenjing Lou, Cao Lian...
JSAC
2010
135views more  JSAC 2010»
14 years 8 months ago
Provisioning mission-critical telerobotic control systems over internet backbone networks with essentially-perfect QoS
—Over the next decades, the Internet will evolve to support increasingly complex mission-critical services such as telerobotically controlled surgery. The world’s first telero...
T. H. Szymanski, D. Gilbert
CORR
2012
Springer
210views Education» more  CORR 2012»
13 years 5 months ago
Stability of the Max-Weight Protocol in Adversarial Wireless Networks
In this paper we consider the MAX-WEIGHT protocol for routing and scheduling in wireless networks under an adversarial model. This protocol has received a significant amount of a...
Sungsu Lim, Kyomin Jung, Matthew Andrews
ARCS
2009
Springer
15 years 4 months ago
Hybrid Resource Discovery Mechanism in Ad Hoc Grid Using Structured Overlay
Resource management has been an area of research in ad hoc grids for many years. Recently, different research projects have focused resource management in centralized, decentralize...
Tariq Abdullah, Luc Onana Alima, Vassiliy Sokolov,...
CCS
2007
ACM
15 years 3 months ago
Non-intrusive IP traceback for DDoS attacks
The paper describes a Non-Intrusive IP traceback scheme which uses sampled traffic under non-attack conditions to build and maintains caches of the valid source addresses transiti...
Vrizlynn L. L. Thing, Morris Sloman, Naranker Dula...