The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper presents preliminary results from a simulation-based study of static, wireless multi-hop networks with linear chain topologies supporting the uni-directional flow of data. Chain lengths of up to 10 nodes have been examined. The effects of varying parameters such as the number of nodes, the MAC data rate, the offered load and the packet size have been investigated. In addition, the influence...
In this paper, an efficient approach to improve the connectivity of any given network is provided by introducing an additional node into the network. More specifically, the additional node acts as a neighbor to certain pair of nodes in the network with only changing one link among the existing nodes. The location of the additional node is designed according to the current topology as well as the states,...
We study the problem of reliably provisioning traffic using multipath routing in a mesh network. Traditional approaches handled reliability requirements using full-protection schemes. Although full-protection approaches offer high assurance, this assurance can be costly. We take a less expensive approach to maintain reliability by offering partial-protection. Specifically, our approach guarantees...
This paper introduces a graph grammar based approach to automated topology synthesis of analog circuits. A grammar is developed to generate circuits through production rules, that are encoded in the form of a derivation tree. The synthesis has been sped up by using dynamically obtained design-suitable building blocks. Our technique has certain advantages when compared to other tree-based approaches...
Key establishment in sensor networks is a challenging problem since asymmetric cryptosystems are unsuitable for use in resource constrained sensor nodes, and also because the nodes are vulnerable to physical capture. The key establishment schemes proposed recently in the literature are known to yield higher connectivity and better resilience against node captures if some prior knowledge of deployment...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.