Sciweavers

5234 search results - page 961 / 1047
» Simulation of Computer Network Attacks
Sort
View
JSAC
2007
180views more  JSAC 2007»
15 years 3 months ago
A Cross-Layer Approach for WLAN Voice Capacity Planning
— This paper presents an analytical approach to determining the maximum number of on/off voice flows that can be supported over a wireless local area network (WLAN), under a qua...
Yu Cheng, Xinhua Ling, Wei Song, Lin X. Cai, Weihu...
TMC
2010
138views more  TMC 2010»
15 years 1 months ago
Reliable Anchor-Based Sensor Localization in Irregular Areas
—Localization is a fundamental problem in wireless sensor networks and its accuracy impacts the efficiency of location-aware protocols and applications, such as routing and stora...
Bin Xiao, Lin Chen, Qingjun Xiao, Minglu Li
SIMPRA
2011
14 years 10 months ago
Virtual segment: Store-carry-forward relay-based support for wide-area non-real-time data exchange
—In the Internet of the future, a flexible, dynamic combination of wireless and wired access networks is expected to be a key driver for enlarging the broadband communication se...
Shinya Yamamura, Akira Nagata, Masato Tsuru, Hitom...
IM
2007
15 years 4 months ago
Robust Monitoring of Network-wide Aggregates through Gossiping
Abstract—We investigate the use of gossip protocols for continuous monitoring of network-wide aggregates under crash failures. Aggregates are computed from local management varia...
Fetahi Wuhib, Mads Dam, Rolf Stadler, Alexander Cl...
ICIP
2001
IEEE
16 years 4 months ago
Fast algorithms for DCT-domain video transcoding
Video transcoding is an efficient way for. rate adaptation and format conversion in various networked video applications. Many transcoder architectures have been proposed to achie...
Chia-Wen Lin, Yuh-Ruey Lee