Sciweavers

814 search results - page 121 / 163
» Solutions to Hidden Terminal Problems in Wireless Networks
Sort
View
CORR
2010
Springer
189views Education» more  CORR 2010»
15 years 18 days ago
ACRR: Ad Hoc On-Demand Distance Vector Routing with Controlled Route Requests
Reactive routing protocols like Ad-hoc On-Demand Distance Vector Routing (AODV) and Dynamic Source Routing in Ad-Hoc Wireless Networks (DSR) which are used in Mobile and Ad-hoc Ne...
Jayesh Kataria, P. S. Dhekne, Sugata Sanyal
96
Voted
CDC
2010
IEEE
103views Control Systems» more  CDC 2010»
14 years 7 months ago
Energy conservation and interference mitigation: From decoupling property to win-win strategy
This paper studies the problem of energy conservation of mobile terminals in a multi-cell TDMA network supporting real-time sessions. The corresponding optimization problem involv...
Liqun Fu, Hongseok Kim, Jianwei Huang, Soung Chang...
108
Voted
INFOCOM
2007
IEEE
15 years 6 months ago
VoIP on Wireless Meshes: Models, Algorithms and Evaluation
—We study the problem of supporting VoIP calls in a wireless mesh network. Specifically, we propose solutions for call admission control (CAC) and route selection for VoIP calls...
Anand Kashyap, Samrat Ganguly, Samir R. Das, Suman...
99
Voted
TC
2008
15 years 13 days ago
An Energy-Delay Tunable Task Allocation Strategy for Collaborative Applications in Networked Embedded Systems
Collaborative applications with energy and low-delay constraints are emerging in various networked embedded systems like wireless sensor networks and multimedia terminals. Conventi...
Tao Xie 0004, Xiao Qin
DSOM
2003
Springer
15 years 5 months ago
Idiosyncratic Signatures for Authenticated Execution of Management Code
TrustedFlow™ is a software solution to the problem of remotely authenticating code during execution. A continuous flow of idiosyncratic signatures assures that the software from ...
Mario Baldi, Yoram Ofek, Moti Yung