The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
We revisit the problem of scheduling the sources transmissions in a many-to-one flow to provide reliable communication between n sources and a single destination. The performance of coding-aware scheduling is studied based on both digital network coding (DNC) and analog network coding (ANC). We discuss some special cases in which an optimal ANC-based schedule can be constructed efficiently. Finally,...
This paper addresses the problem of survivability of many-to-one flows in wireless networks, such as wireless mesh networks (WMNs) and wireless sensor networks (WSNs). Traditional protection schemes are either resource-hungry like the (1+1) protection scheme, or introduce a delay and interrupt the network operation like the (1 : N) protection scheme. In this paper, we present a network coding-based...
In this paper, we present a new technique that uses deterministic binary network coding in a distributed manner to enhance the resiliency of sensor-to-base information flow against packet loss. First, we show how to use network coding to tolerate a single packet loss, and then we extend the solution to tolerate multiple losses. Moreover, we study the coding efficiency issue and introduce the idea...
Survivability of wireless mesh networks (WMNs) is a crucial issue that has not received enough attention in the literature. In this paper, we present a network coding-based protection scheme that overcomes the deficiencies in traditional proactive and reactive protection mechanisms. Proactive schemes ((1+1) protection) provide instantaneous recovery, but are resource-hungry. While reactive schemes...
Survivability of many-to-one flow networks such as wireless mesh networks (WMNs) and wireless sensor networks (WSNs) is an important issue that has not received enough attention in the literature. Traditional proactive and reactive protection schemes are either resource-hungry like the (1 + 1) protection scheme, or introduce a delay and interrupt the network operation like the (1 : N) protection scheme...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.