Search
Now showing items 161-170 of 262
All-to-all throughput maximization in wireless relay networks with multiple packet reception
(2012 , Conference Paper)
Network Coding (NC) has shown the promise of significant throughput improvement to wireless networks. Meanwhile, Multiple Packet Reception (MPR) has been proved as an efficient way to combat the Multiple Access Interference ...
Forced spectrum access termination probability analysis under restricted channel handoff
(2012 , Conference Paper)
Most existing works on cognitive radio networks assume that cognitive (or secondary) users are capable of switching/jumping to any available channel, regardless of the frequency gap between the target and the current ...
Cognitive transmission based on data priority classification in WSNs for Smart Grid
(2012 , Conference Paper)
Smart Grid integrates digital processing, sensor technology, automatic control and communication to the traditional power grid to achieve more efficient electricity distribution and management. Applying wireless sensor ...
Discovering influential users in micro-blog marketing with influence maximization mechanism
(2012 , Conference Paper)
Micro-blog marketing has become a main business model for social networks nowadays. On social networking sites (e.g., Twitter), micro-blog marketing enables the advertisers to put ads to attract customers to buy their ...
EM-MAC: An energy-aware multi-channel MAC protocol for multi-hop wireless networks
(2012 , Conference Paper)
We propose an energy-aware MAC protocol, referred to as EM-MAC, for multi-hop wireless networks with multi-channel access capabilities. EM-MAC relies on iMAC's efficient channel selection mechanism to resolve the medium ...
A novel P2P VoD streaming technique integrating localization and congestion awareness strategies
(2012 , Conference Paper)
The concept of the "future Internet" has evolved amongst researchers recently to relieve the tremendous pressure on the current Internet infrastructure to support the heterogeneous networking technologies, mobile devices, ...
Secure service provision in smart grid communications
(2012 , Article)
The smart grid provides a platform for thirdparty service providers to remotely monitor and manage energy usage for consumers. At the same time, the involvement of service providers brings a new set of security threats to ...
Understanding the topologies of BitTorrent networks: A measurement view
(2012 , Conference Paper)
BitTorrent (BT) is one of the most popular Peer-to-Peer (P2P) network applications. Most characteristics (except the topology) of BT network have been examined extensively by measurement approaches. In this work, we deploy ...
Maximizing secondary-user satisfaction in large-scale DSA systems through distributed team cooperation
(2012 , Article)
We develop resource and service management techniques to support secondary users (\su s) with QoS requirements in large-scale distributed dynamic spectrum access (\osa) systems. The proposed techniques empower \su s to ...
An improved SVPWM method for multilevel inverters
(
IEEE
, 2012 , Conference Paper)
This paper proposes a new general Space Vector PWM (SVPWM) method for Multi-Level Inverters (MLI) based on a generalization of dwell-times calculation. The presented scheme is developed for Cascaded H-Bridge (CHB) inverter. ...