Sciweavers

479 search results - page 31 / 96
» cn 2008
Sort
View
EJC
2008
14 years 10 months ago
Identifying codes of cycles with odd orders
The problem of the r-identifying code of a cycle Cn has been solved totally when n is even. Recently, S. Gravier et al. give the r-identifying code for the cycle Cn with the minim...
Min Xu, Krishnaiyan Thulasiraman, Xiao-Dong Hu
CN
2008
83views more  CN 2008»
14 years 10 months ago
A framework for fast RFID tag reading in static and mobile environments
A framework for reducing the average reading time of passive RFID tags in dense environments is introduced. The proposed framework termed Accelerated Frame Slotted ALOHA (AFSA) ca...
Venkatesh Sarangan, M. R. Devarapalli, Sridhar Rad...
CN
2008
118views more  CN 2008»
14 years 10 months ago
Modeling and computing throughput capacity of wireless multihop networks
Capacity is an important property for QoS support in Mobile Ad Hoc Networks (MANETs) and has been extensively studied. However, most approaches rely on simplified models (e.g., pr...
Patrick Stuedi, Gustavo Alonso
CN
2006
77views more  CN 2006»
14 years 10 months ago
Optimizing multimedia transcoding multicast trees
In this paper, network hosted transcoding is studied for the optimization of resources in multicast applications. The configuration is as follows: one source node is sending a sig...
Thijs Lambrecht, Bart Duysburgh, Tim Wauters, Fili...
CN
2006
98views more  CN 2006»
14 years 10 months ago
Internet resiliency to attacks and failures under BGP policy routing
We investigate the resiliency of the Internet at the Autonomous System (AS) level to failures and attacks, under the real constraint of business agreements between the ASs. The ag...
Danny Dolev, Sugih Jamin, Osnat Mokryn, Yuval Shav...