Sciweavers

4000 search results - page 729 / 800
» Simulation down under
Sort
View
145
Voted
MOBIWAC
2006
ACM
15 years 10 months ago
Evaluation of multi-radio extensions to AODV for wireless mesh networks
Due to their self-configuring and self-healing capabilities, as well as their low equipment and deployment cost, Wireless Mesh Networks (WMNs) based on commodity hardware present...
Asad Amir Pirzada, Marius Portmann, Jadwiga Induls...
SAC
2006
ACM
15 years 10 months ago
Interval-based robust statistical techniques for non-negative convex functions, with application to timing analysis of computer
: In chip design, one of the main objectives is to decrease its clock cycle; however, the existing approaches to timing analysis under uncertainty are based on fundamentally restri...
Michael Orshansky, Wei-Shen Wang, Martine Ceberio,...
SENSYS
2006
ACM
15 years 10 months ago
Datalink streaming in wireless sensor networks
Datalink layer framing in wireless sensor networks usually faces a trade-off between large frame sizes for high channel bandwidth utilization and small frame sizes for effective e...
Raghu K. Ganti, Praveen Jayachandran, Haiyun Luo, ...
SIGCOMM
2006
ACM
15 years 10 months ago
Virtual ring routing: network routing inspired by DHTs
This paper presents Virtual Ring Routing (VRR), a new network routing protocol that occupies a unique point in the design space. VRR is inspired by overlay routing algorithms in D...
Matthew Caesar, Miguel Castro, Edmund B. Nightinga...
DASFAA
2005
IEEE
106views Database» more  DASFAA 2005»
15 years 9 months ago
Real Datasets for File-Sharing Peer-to-Peer Systems
The fundamental drawback of unstructured peer-to-peer (P2P) networks is the flooding-based query processing protocol that seriously limits their scalability. As a result, a signi...
Shen-Tat Goh, Panos Kalnis, Spiridon Bakiras, Kian...