Sciweavers

277 search results - page 25 / 56
» Throughput and delay optimization in interference-limited mu...
Sort
View
JNW
2007
89views more  JNW 2007»
14 years 9 months ago
Traffic Aware Power Saving Protocol in Multi-hop Mobile Ad-Hoc Networks
— This paper presents an optimization of PSM to improve its energy conservation. According to PSM, time is divided into beacon intervals. At the beginning of each beacon interval...
Abdelfattah Belghith, Wafa Akkari, Jean-Marie Bonn...
JSAC
2008
125views more  JSAC 2008»
14 years 9 months ago
RIPT: A Receiver-Initiated Reservation-Based Protocol for Underwater Acoustic Networks
Although there are many MAC protocols that have been proposed for terrestrial wireless networks with a wide variety of aspects, these protocols cannot be applied directly in underw...
Nitthita Chirdchoo, Wee-Seng Soh, Kee Chaing Chua
PEWASUN
2006
ACM
15 years 3 months ago
Experimental analysis of a transport protocol for ad hoc networks (TPA)
Many previous papers have pointed out that TCP performance in multi-hop ad hoc networks is not optimal. This is due to several TCP design principles that reflect the characteristi...
Giuseppe Anastasi, Emilio Ancillotti, Marco Conti,...
SIGCOMM
2005
ACM
15 years 3 months ago
Idle sense: an optimal access method for high throughput and fairness in rate diverse wireless LANs
We consider wireless LANs such as IEEE 802.11 operating in the unlicensed radio spectrum. While their nominal bit rates have increased considerably, the MAC layer remains practica...
Martin Heusse, Franck Rousseau, Romaric Guillier, ...
CORR
2007
Springer
124views Education» more  CORR 2007»
14 years 9 months ago
Anonymous Networking amidst Eavesdroppers
—The problem of security against packet timing based traffic analysis in wireless networks is considered in this work. An analytical measure of “anonymity” of routes in eave...
Parvathinathan Venkitasubramaniam, Ting He, Lang T...