Sciweavers

2947 search results - page 153 / 590
» The timely token protocol
Sort
View
146
Voted
JNW
2008
79views more  JNW 2008»
15 years 5 months ago
A Call Admission Control Protocol for Multimedia Cellular Networks
The performance of any cellular wireless network, as well as its revenue (number of customers using the network, and their degree of satisfaction) is determined to a great extent b...
Ayman Elnaggar, Mokhtar Aboelaze, Maan Musleh
284
Voted
CONIELECOMP
2011
IEEE
14 years 8 months ago
DSRP: Distributed SensorWeb Routing Protocol
—We propose a new multi-hop routing protocol for wireless sensor networks, suited for monitoring and control applications. The aim of this research is to adapt flat and hierarch...
Abhinav Valada, David Kohanbash, George Kantor
BSN
2009
IEEE
141views Sensor Networks» more  BSN 2009»
15 years 12 months ago
Low-Complexity, High-Throughput Multiple-Access Wireless Protocol for Body Sensor Networks
Wireless systems that form a body-area network must be made small and low power without sacrificing performance. To achieve high-throughput communication in low-cost wireless bod...
Seung-mok Yoo, Chong-Jing Chen, Pai H. Chou
ICC
2009
IEEE
135views Communications» more  ICC 2009»
15 years 11 months ago
A Polite Cross-Layer Protocol for Contention-Based Home Power-Line Communications
—In typical home power-line communication (PLC) networks using contention-based access methods, providing Quality-of-service (QoS) to high-priority users often comes at the expen...
Aakanksha Chowdhery, Sumanth Jagannathan, John M. ...
CANS
2009
Springer
180views Cryptology» more  CANS 2009»
15 years 11 months ago
RFID Distance Bounding Protocol with Mixed Challenges to Prevent Relay Attacks
RFID systems suffer from different location-based attacks such as distance fraud, mafia fraud and terrorist fraud attacks. Among them mafia fraud attack is the most serious sin...
Chong Hee Kim, Gildas Avoine