Sciweavers

5234 search results - page 814 / 1047
» Simulation of Computer Network Attacks
Sort
View
TWC
2010
14 years 11 months ago
Optimized opportunistic multicast scheduling (OMS) over wireless cellular networks
Optimized opportunistic multicast scheduling (OMS) is studied for cellular networks, where the problem of efficiently transmitting a common set of fountain-encoded data from a sin...
Tze-Ping Low, Man-On Pun, Yao-Win Peter Hong, C.-C...
PERCOM
2009
ACM
16 years 5 months ago
Video Ads Dissemination through WiFi-Cellular Hybrid Networks
In this paper, we propose a method for video ads dissemination through a hybrid network consisting of WiFi and cellular networks, in order to provide timely delivery of video ads w...
Hiroshi Hanano, Yoshihiro Murata, Naoki Shibata, K...
IPSN
2009
Springer
15 years 11 months ago
Distributed resource management and matching in sensor networks
We consider a scenario in which there are resources at or near nodes of a network, which are either static (e.g. fire stations, parking spots) or mobile (e.g. police cars). Over ...
Jie Gao, Leonidas J. Guibas, Nikola Milosavljevic,...
IROS
2009
IEEE
174views Robotics» more  IROS 2009»
15 years 11 months ago
Characterization and modeling of wireless channels for networked robotic and control systems - a comprehensive overview
— The goal of this paper is to serve as a reference for researchers in robotics and control that are interested in realistic modeling, theoretical analysis and simulation of wire...
Yasamin Mostofi, Alejandro Gonzalez-Ruiz, Alireza ...
MOBILITY
2009
ACM
15 years 11 months ago
A membership management protocol for mobile P2P networks
MANETs are self-organizing networks composed of mobile wireless nodes with often scarce resources. Distributed applications based on the P2P paradigm are by nature good candidates...
Mohamed Karim Sbai, Emna Salhi, Chadi Barakat