Sciweavers

2947 search results - page 529 / 590
» The timely token protocol
Sort
View
SENSYS
2010
ACM
14 years 9 months ago
Design and evaluation of a versatile and efficient receiver-initiated link layer for low-power wireless
We present A-MAC, a receiver-initiated link layer for low-power wireless networks that supports several services under a unified architecture, and does so more efficiently and sca...
Prabal Dutta, Stephen Dawson-Haggerty, Yin Chen, C...
TGC
2010
Springer
14 years 9 months ago
CarPal: Interconnecting Overlay Networks for a Community-Driven Shared Mobility
Car sharing and car pooling have proven to be an effective solution to reduce the amount of running vehicles by increasing the number of passengers per car amongst medium/big commu...
Vincenzo Dezani-Ciancaglini, Luigi Liquori, Lauren...
WD
2010
14 years 9 months ago
Vicinity resource cartography for delay-tolerant networks: A holistic perspective
In this paper we propose a distributed approach to construct vicinity resource maps at each node in a delaytolerant network. The scheme uses recent encounters to estimate the avail...
Gabriel Sandulescu, Péter Schaffer, Simin N...
91
Voted
ICC
2009
IEEE
14 years 9 months ago
Simulation of SPIT Filtering: Quantitative Evaluation of Parameter Tuning
A future where Internet Telephony will constitute a target valuable to attack is not so unrealistic. E-mail spam botnets software can be updated to send voice spam (commonly referr...
Federico Menna, Renato Lo Cigno, Saverio Niccolini...
ICC
2009
IEEE
121views Communications» more  ICC 2009»
14 years 9 months ago
Three Layered Hidden Markov Models for Binary Digital Wireless Channels
Abstract--Generative models are created to be used in the design and performance assessment of high layer wireless communication protocols and some error control strategies. Genera...
Omar S. Salih, Cheng-Xiang Wang, David I. Laurenso...