default search action
5. QSHINE 2008: Hong Kong
- Lionel M. Ni, Jiannong Cao:
5th International ICST Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness, QSHINE 2008, Hong Kong, July 28-31, 2008. ICST 2008, ISBN 978-963-9799-26-4
Wireless mesh networks
- Jeng Farn Lee, Yuan-Neng Hsu:
Fairness in multi-hop wireless backhaul networks: a dynamic estimation approach. 1 - Tehuang Li, Wanjiun Liao:
Distributed contention-aware call admission control for IEEE 802.11 multi-radio multi-rate multi-channel wireless mesh networks. 2 - Yang Song, Chi Zhang, Yuguang Fang:
Routing optimization in wireless mesh networks under uncertain traffic demands. 3
Information management in wireless sensor networks
- Min Chen, Victor C. M. Leung, Shiwen Mao:
Directional controlled fusion in wireless sensor networks. 4 - Yueming Hu, Qing Li, Fangming Liu, Gabriel Yik Keung, Bo Li:
A preliminary study of information collection in a mobile sensor network. 5 - Ruiyun Yu, Qiang Chen, Xingwei Wang, Sajal K. Das:
Efficient data gathering in partially connected and delay-tolerant wireless sensor networks. 6
Routing in wireless ad hoc networks
- Hui Cheng, Jiannong Cao, Xiaopeng Fan:
GMZRP: geography-aided multicast zone routing protocol in mobile ad hoc networks. 7 - Yuxia Lin, Joo-Han Song, Vincent W. S. Wong:
Cooperative protocols design for wireless ad-hoc networks with multi-hop routing. 8 - Hany Samuel, Weihua Zhuang, Bruno R. Preiss:
DTN based dominating set routing technique for mobile ad hoc networks. 9
Wireless security
- Yanchao Zhang, Kui Ren:
Towards address privacy in mobile ad hoc networks. 10 - Wei Ren, Kui Ren, Wenjing Lou, Yanchao Zhang:
Efficient user revocation for privacy-aware PKI. 11 - Chengqi Song, Qian Zhang:
OMH: suppressing selfish behavior in ad hoc networks with One More Hop. 12
Topics related to P2P networks/overlay networks
- Zhenjiang Li, Yao Yu, Xiaojun Hei, Danny H. K. Tsang:
Towards low-redundancy push-pull P2P live streaming. 13 - Jinkang Jia, Changjia Chen:
A mesh check scheme against P2P live streaming attacks. 14 - Jialing Xu, Victor O. K. Li:
A request-driven swarming scheme for P2P data streaming. 15
Wireless personal area networks
- Lin X. Cai, Lin Cai, Xuemin Sherman Shen, Jon W. Mark:
Admission control and concurrent scheduling for IPTV over mmWave-based WPANs. 16 - Chonggang Wang, Mahmoud Daneshmand, Bo Li, Kazem Sohraby:
Performance improvement of generation-2 RFID protocol. 17 - Dennis K. Nilsson, Ulf E. Larson, Erland Jonsson:
Auxiliary channel Diffie-Hellman encrypted key-exchange authentication. 18
MAC design in wireless ad hoc networks
- Jinfang Zhang, Zbigniew Dziong, François Gagnon, Michel Kadoch:
Receiver initiated MAC design for ad hoc networks based on multiuser detection. 19 - Qinqing Zhang, Lotfi Benmohamed, I-Jeng Wang:
Exploiting time and user diversity in distributed medium access control for mobile ad-hoc networks. 20 - Jianxin Wang, Yuhong Luo, Jiawei Huang, Xi Zhang:
VCGG: a varying cone distributed topology-control algorithm for wireless ad hoc networks. 21
QoS support in general networks
- Nemanja Vucevic, Francisco Bernardo, Anna Umbert, Miguel López-Benítez:
End-to-edge QoS across heterogeneous wireless and wired domains. 22 - Xingwei Wang, Qiang Chen, Rongzhu Zou, Min Huang:
An ABC supported QoS multicast routing scheme based on beehive algorithm. 23
Topics in wireless sensor networks
- Yangfan Zhou, Michael R. Lyu, Jiangchuan Liu:
On sensor network reconfiguration for downtime-free system migrations. 24 - Xingcheng Liu, Xiaoxiang Bian, Haengrae Cho:
A novel cluster-chain channel adaptive routing protocol in wireless sensor networks. 25 - Hongli Xu, Liusheng Huang, Junmin Wu, Gang Wang, Wang Liu:
Delay-constraint topology control in wireless sensor networks format. 26
Topics related to P2P networks/overlay networks
- Qiong Sun, Victor O. K. Li, Ka-Cheong Leung:
Efficient content distribution in wireless P2P networks. 27 - Sirui Yang, Hai Jin, Bo Li, Xiaofei Liao, Hong Yao, Qi Huang:
Measuring web feature impacts in BitTorrent-like systems. 28 - Min Zhang, Changjia Chen, Jinkang Jia:
Fake servers in EDonkey networks. 29
Cognitive radio networks
- Jelena V. Misic, Vojislav B. Misic:
Reducing sensing error in cognitive PANs through differential sensing. 30 - Yuan Wu, Danny H. K. Tsang:
Joint rate and power allocation in spectrum sharing networks with balanced QoS provisioning and power saving. 31 - Chao Song, Jiannong Cao, Ming Liu, Yuan Zheng, Haigang Gong, Guihai Chen:
Mitigating energy holes based on transmission range adjustment in wireless sensor networks. 32
QoS support in general networks
- Manish Jain, Puneet Sharma, Sujata Banerjee:
QoS-guaranteed path selection algorithm for service composition. 33 - Binqiang Wang, Shuqiao Chen:
PMUF: a high-performance scheduling algorithm for DiffServ classes. 34
Cross-layer design for wireless networks
- Lei Zhang, Patrick Sénac, Emmanuel Lochin, Michel Diaz:
Cross-layer based congestion control for WLANs. 35 - Víctor Carrascal Frías, Guillermo Díaz-Delgado, Aída Zavala-Ayala, Mónica Aguilar-Igartua:
Dynamic cross-layer framework to provide QoS for video streaming services over ad hoc networks. 36 - Danhua Zhang, Chao Zhang, Jianhua Lu:
Joint congestion control, contention control and resource allocation in wireless networks. 37
Topics in general wireless networks
- Qiang Shen, Xuming Fang, Rongsheng Huang, Pan Li, Yuguang Fang:
Leveraging spatial reuse with adaptive carrier sensing in 802.11 wireless networks. 38 - Feng Wang, Mounir Hamdi:
QoS based scheduling in the downlink of multiuser wireless systems. 39
IEEE 802.16 based networks
- Jenhui Chen, Syao-Syuan Liu, Chih-Chieh Wang:
Fault-tolerant transmission mechanism for IEEE 802.16e OFDMA systems. 40 - Jau-Yang Chang:
A distributed QoS guaranteed scheme for IEEE 802.16 broadband wireless access systems. 41 - Weiwei Wang, Changjia Chen, Zihua Guo, Jun Cai, Xuemin Sherman Shen:
Isolation band based frequency reuse scheme for IEEE 802.16j wireless relay networks. 42
QoS support in general networks
- Yinfeng Wang, Kwang Mong Sim, Xiaoshe Dong:
A mechanism of automated monitoring deployment in grid environment. 43 - Kin-Hon Ho, Ning Wang, George Pavlou, Christos Botsiaris:
Optimizing post-failure network performance for IP Fast ReRoute using tunnels. 44
Other topics
- Jin Tang, Carol Davids, Yu Cheng:
A study of an open source IP multimedia subsystem test bed. 45 - Chunwang Gao, Zhen Yu, Yawen Wei, Steve Russell, Yong Guan:
A statistical indoor localization method for supporting location-based access control. 46 - Ming Li, Wenjing Lou:
Opportunistic broadcast of emergency messages in vehicular ad hoc networks with unreliable links. 47
FTDA-DN: ad hoc networks
- Kin Choong Yow, Gui Ying Aw:
Efficient node reconfiguration in mobile ad hoc networks (MANETs) for wireless internet access point connection. 48 - Abdelfettah Belghith, Adel Ben Mnaouer, Hanen Idoudi:
Polymorphic routing using proactive and probabilistic approaches for MANETs. 49 - Sofiene Jelassi, Habib Youssef:
Connectivity aware instrumental approach for measuring vocal transmission quality over a wireless ad hoc network. 50
FTDA-DN: sensor and mobile networks
- Mohamed Kassab, Safaà Hachana, Jean-Marie Bonnin, Abdelfettah Belghith:
High-mobility effects on WLAN fast re-authentication efficiency. 51 - Miklós Molnár, Gyula Simon, László Gönczy:
Robustness and performance analysis of a dynamic sensor network scheduling algorithm. 52 - Rachid Zagrouba, Jean-Marie Bonnin, Karine Guillouard:
A centralized resource reservation for cellular IP access networks. 53
ConnectingHealth, AIGC: connecting heather
- Kae Hsiang Kwong, Hock Guan Goh, W. Craig Michie, Ivan Andonovic:
Quality of service control in wireless sensor network with priority access. 54 - Tao Gong:
Anti-virus security and robustness of heterogeneous immune static network. 55
ConnectingHealth, AIGC: artifical intelligence in grid computing
- Mostafa Rahimi Azghadi, Mohammad Reza Bonyadi, Sara Hashemi, Mohsen Ebrahimi Moghaddam:
A hybrid multiprocessor task scheduling method based on immune genetic algorithm. 56 - Kun Zhang, De-fen Pan:
Security deciding in publishing views based on entropy. 57
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.