Sciweavers

5234 search results - page 708 / 1047
» Simulation of Computer Network Attacks
Sort
View
ICC
2009
IEEE
136views Communications» more  ICC 2009»
15 years 11 months ago
Fast Connected Dominating Set Construction in Mobile Ad Hoc Networks
—The connected dominating set (CDS) has been commonly used for routing and broadcast in mobile ad hoc networks (MANETs). Considering the applications of MANETs, it is generally p...
Kazuya Sakai, Min-Te Sun, Wei-Shinn Ku
GLOBECOM
2008
IEEE
15 years 11 months ago
Link Rate Allocation under Bandwidth and Energy Constraints in Sensor Networks
—In sensor networks, both energy and bandwidth are scarce resources. In the past, many energy efficient routing algorithms have been devised in order to maximize network lifetim...
Maggie X. Cheng, Xuan Gong, Lin Cai
135
Voted
ICC
2008
IEEE
150views Communications» more  ICC 2008»
15 years 11 months ago
Adaptive Modulation-Based TCP-Aware Uplink Scheduling in IEEE 802.16 Networks
— In this paper we propose polling based uplink scheduling schemes for TCP based applications in a multipointto-point fixed broadband IEEE 802.16 network. Our schemes adapt the ...
Hemant Kumar Rath, Abhay Karandikar, Vishal Sharma
ICC
2007
IEEE
153views Communications» more  ICC 2007»
15 years 11 months ago
A Walking Beacon-Assisted Localization in Wireless Sensor Networks
—The localization of the sensor node is a fundamental problem in sensor networks and can be implemented using powerful and expensive beacons. Beacons, the fewer the better, can a...
Bin Xiao, Hekang Chen, Shuigeng Zhou
ICDS
2007
IEEE
15 years 11 months ago
On Burst Loss in Optical Burst Switched Networks with Hot Potato Deflection Routing
In this article we investigate the effects of increased Control Packet lead Time (CPT) on the loss probability of bursts in an OBS network with deflection routing. In particular w...
Stein Gjessing