• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 11 - 20 of 113,099
Next 10 →

Table 1.2: Mapping of an ad hoc wireless network components to a game

in Dedicated To
by Prof Y. Narahari, Lord Sri Venkateswara 2006

Table I. Scheduling algorithms for TD/CDMA wireless ad hoc networks.

in WIRELESS COMMUNICATIONS AND MOBILE COMPUTING
by unknown authors

TABLE I A REVIEW OVER SERVICE DISCOVERY PROTOCOLS IN AD HOC NETWORKS

in Resource Discovery in Activity-Based Sensor Networks
by unknown authors

Table 3.2: Comparison of OA MAC Algorithms in Ad-Hoc Networks

in Dedicated to
by Shoaib Tariq, My Loving

Table 3.3: Comparison of DA MAC Algorithms in Ad-Hoc Networks

in Dedicated to
by Shoaib Tariq, My Loving

Table 2. Average latency in 802.11b ad-hoc network for both testbeds.

in Intrusion tolerance in wireless environments: An experimental evaluation
by Henrique Moniz, Nuno Ferreira Neves, Miguel Correia, António Casimiro, Paulo Veríssimo

Table 10: Multi-hop Ad-Hoc Network Model with Minimum-Path Routing

in Energy-Efficient MAC in Ad Hoc Networks Inspired by Conflict Resolution Concepts
by Yalin Evren Sagduyu, Anthony Ephremides

Table 1: Ad-Hoc Results

in TREC-3 Ad-Hoc, Routing Retrieval and Thresholding Experiments using PIRCS
by K. L. Kwok, L. Grunfeld, D. D. Lewis 1995
"... In PAGE 3: ... 3.2 Results A summary comparison of our approaches to ad-hoc retrieval averaged over the 50 queries in Q4 is tabulated in Table1 below. Compared with our standard approach pircs0, both of our enhancements in pircs1 and pircs2 are successful.... ..."
Cited by 20

Table 1 Sample Trace Data for Ad-Hoc Routing Distance Velocity PCR PCH ...

in Intrusion Detection Techniques for Mobile Wireless Networks
by Yongguang Zhang, Wenke Lee, Yi-an Huang
"... In PAGE 9: ...f mobile networks (i.e., the number of nodes/routes is not xed). Table1 shows some ctional trace data for a node. During the \training quot; process, where a diversity of normal situations are simulated, the trace data is gath- ered for each node.... ..."

Table 2. Typical mapping of ad hoc network components to a game

in Srivastava et al., “Using Game Theory to Analyze Wireless Ad Hoc Networks ” 1 Using Game Theory to Analyze Wireless Ad Hoc Networks
by Vivek Srivastava, James Neel, Allen B. Mackenzie, Rekha Menon, Luiz A, James E. Hicks, Jeffrey H. Reed, Robert P. Gilles
"... In PAGE 4: ...ctions. Nodes in an ad hoc network are characterized by the same feature. This similarity leads to a strong mapping between traditional game theory components and elements of an ad hoc network. Table2 shows typical components of an ad hoc networking game. ... ..."
Next 10 →
Results 11 - 20 of 113,099
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University