Sciweavers

5234 search results - page 715 / 1047
» Simulation of Computer Network Attacks
Sort
View
157
Voted
ICC
2007
IEEE
144views Communications» more  ICC 2007»
15 years 11 months ago
Buffer Occupancy-Based CAC in Converged IP and Broadcasting Networks
— This paper introduces a buffer occupancy -based admission control mechanism aimed to counter link congestion while fairly sharing the bandwidth in converged IP and broadcasting...
Yassine Hadjadj Aoul, Abdelhamid Nafaa, Ahmed Meha...
ICCCN
2007
IEEE
15 years 11 months ago
Utility-Based Routing in Communication Networks with Unstable Links
Abstract—Traditional Dijkstra and Bellman-Ford routing algorithms can only provide the best route to each destination based on a fixed link cost model. We propose a utility-base...
Mingming Lu, Jie Wu
ICPADS
2006
IEEE
15 years 11 months ago
On the Effects of Consistency in Data Operations in Wireless Sensor Networks
In battery powered systems such as wireless sensor networks, energy efficiency is one of the most important system design goals. In this paper, energy efficiency is examined fro...
Kewei Sha, Weisong Shi
IEEECIT
2006
IEEE
15 years 11 months ago
Information Coverage Configuration with Energy Preservation in Large Scale Wireless Sensor Networks
Coverage configuration is an important issue in large scale wireless sensor networks (WSNs). Existing coverage configuration methods are generally based on the concept of physical...
Hongxing Bai, Xi Chen, Yu-Chi Ho, Xiaohong Guan
SIGECOM
2004
ACM
120views ECommerce» more  SIGECOM 2004»
15 years 10 months ago
Robust incentive techniques for peer-to-peer networks
Lack of cooperation (free riding) is one of the key problems that confronts today’s P2P systems. What makes this problem particularly difficult is the unique set of challenges ...
Michal Feldman, Kevin Lai, Ion Stoica, John Chuang