Sciweavers

577 search results - page 34 / 116
» Throughput Scaling of Wireless Networks With Random Connecti...
Sort
View
ISCA
2005
IEEE
134views Hardware» more  ISCA 2005»
15 years 3 months ago
A High Throughput String Matching Architecture for Intrusion Detection and Prevention
Network Intrusion Detection and Prevention Systems have emerged as one of the most effective ways of providing security to those connected to the network, and at the heart of alm...
Lin Tan, Timothy Sherwood
JCO
2006
234views more  JCO 2006»
14 years 9 months ago
Coverage by directional sensors in randomly deployed wireless sensor networks
We study a novel "coverage by directional sensors" problem with tunable orientations on a set of discrete targets. We propose a Maximum Coverage with Minimum Sensors (MCM...
Jing Ai, Alhussein A. Abouzeid
ADHOC
2006
124views more  ADHOC 2006»
14 years 10 months ago
Mobility-capacity-delay trade-off in wireless ad hoc networks
We show that there is a trade-off among mobility, capacity, and delay in ad hoc networks. More specifically, we consider two schemes for node mobility in ad hoc networks. We divid...
Renato M. de Moraes, Hamid R. Sadjadpour, J. J. Ga...
TMC
2012
13 years 6 days ago
Resource-Aware Video Multicasting via Access Gateways in Wireless Mesh Networks
—This paper studies video multicasting in large scale areas using wireless mesh networks. The focus is on the use of Internet access gateways that allow a choice of alternative r...
Wanqing Tu, Cormac J. Sreenan, Chun Tung Chou, Arc...
INFOCOM
2007
IEEE
15 years 4 months ago
Hierarchical Cooperation Achieves Linear Capacity Scaling in Ad Hoc Networks
— n source and destination pairs randomly located in a fixed area want to communicate with each other. It is well known that classical multihop architectures that decode and for...
Ayfer Özgür, Olivier Lévêqu...