Zobrazeno 1 - 10
of 130
pro vyhledávání: '"C.2 COMPUTER-COMMUNICATION NETWORKS"'
Publikováno v:
ISTI Working papers, 2016
This paper presents an exact formula to calculate the probability of the number of successful or dually collided users in finite-user slotted-ALOHA-like systems and to approximate the number of collisions per frame. Such a formula can be employed to
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::54a7c9e8af8979d648fc2764c4584e54
https://openportal.isti.cnr.it/doc?id=people______::54a7c9e8af8979d648fc2764c4584e54
https://openportal.isti.cnr.it/doc?id=people______::54a7c9e8af8979d648fc2764c4584e54
Autor:
Bacco F. M.
According to data traffic forecast reports, the volume of data transported by Internet in 2020 will exceed the threshold of 2.0 zettabytes per year, generated by more than trillion of devices. Only a minor portion of the traffic will be generated by
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::76fd9fa101ef25e38408e05eadd53de4
https://openportal.isti.cnr.it/doc?id=people______::76fd9fa101ef25e38408e05eadd53de4
https://openportal.isti.cnr.it/doc?id=people______::76fd9fa101ef25e38408e05eadd53de4
Autor:
Musian D., Alvino S., Vozzi F., Parodi O., Parolini M., Giugni F., Sandys R., Lupiáñez-Villanueva F., Ferro E., Fauli C., Ascolese A., Palumbo F., Gallicchio C., Scase M., Bacciu D., Micheli A., Kropf J., Marandure B., Monton E., Hanke S., Kreiner K., Dutton R., Northwood D., Hall S., Cannon D., La Rosa D.
Publikováno v:
Project report, DOREMI, Deliverable D6.6, 2016
The deliverable reports all the technical and clinical results reached in the final validation phase according to the plan elaborated in WP2 and described in D2.3. The report will include a detailed descriptions of the preparatory and implementation
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::6654a57f5cd483a49e4d9098054dcb91
https://openportal.isti.cnr.it/doc?id=people______::6654a57f5cd483a49e4d9098054dcb91
https://openportal.isti.cnr.it/doc?id=people______::6654a57f5cd483a49e4d9098054dcb91
Publikováno v:
IEEE Communications Magazine
IEEE communications magazine
48/9 (2010): 126–139. doi:10.1109/MCOM.2010.5560597
info:cnr-pdr/source/autori:Conti M.; Giordano S.; May M.; Passarella A./titolo:From Opportunistic Networks to Opportunistic Computing/doi:10.1109%2FMCOM.2010.5560597/rivista:IEEE communications magazine (Print)/anno:2010/pagina_da:126/pagina_a:139/intervallo_pagine:126–139/volume:48%2F9
IEEE communications magazine
48/9 (2010): 126–139. doi:10.1109/MCOM.2010.5560597
info:cnr-pdr/source/autori:Conti M.; Giordano S.; May M.; Passarella A./titolo:From Opportunistic Networks to Opportunistic Computing/doi:10.1109%2FMCOM.2010.5560597/rivista:IEEE communications magazine (Print)/anno:2010/pagina_da:126/pagina_a:139/intervallo_pagine:126–139/volume:48%2F9
Personal computing devices, such as smart- phones and PDAs, are commonplace, bundle several wireless network interfaces, can support compute intensive tasks, and are equipped with powerful means to produce multimedia content. Thus, they provide the r
Publikováno v:
IEEE transactions on mobile computing 9 (2010): 333–347. doi:10.1109/TMC.2009.134
info:cnr-pdr/source/autori:Canali C.; Renda M. E.; Santi P.; Burresi S./titolo:Enabling Efficient Peer-to-Peer Resource Sharing in Wireless Mesh Networks/doi:10.1109%2FTMC.2009.134/rivista:IEEE transactions on mobile computing/anno:2010/pagina_da:333/pagina_a:347/intervallo_pagine:333–347/volume:9
info:cnr-pdr/source/autori:Canali C.; Renda M. E.; Santi P.; Burresi S./titolo:Enabling Efficient Peer-to-Peer Resource Sharing in Wireless Mesh Networks/doi:10.1109%2FTMC.2009.134/rivista:IEEE transactions on mobile computing/anno:2010/pagina_da:333/pagina_a:347/intervallo_pagine:333–347/volume:9
Wireless mesh networks are a promising area for the deployment of new wireless communication and networking technologies. In this paper, we address the problem of enabling effective peer-to-peer resource sharing in this type of networks. Starting fro
Publikováno v:
Performance evaluation 66 (2009): 811–825. doi:10.1016/j.peva.2009.08.014
info:cnr-pdr/source/autori:Conti M.; Bruno R.; Ancillotti E./titolo:Design and Performance Evaluation of Throughput-Aware Rate Adaptation Protocols for IEEE 802.11 Wireless Networks/doi:10.1016%2Fj.peva.2009.08.014/rivista:Performance evaluation/anno:2009/pagina_da:811/pagina_a:825/intervallo_pagine:811–825/volume:66
info:cnr-pdr/source/autori:Conti M.; Bruno R.; Ancillotti E./titolo:Design and Performance Evaluation of Throughput-Aware Rate Adaptation Protocols for IEEE 802.11 Wireless Networks/doi:10.1016%2Fj.peva.2009.08.014/rivista:Performance evaluation/anno:2009/pagina_da:811/pagina_a:825/intervallo_pagine:811–825/volume:66
Experimental studies have shown that traditional rate adaptation schemes for 802.11 wireless networks suffer from significant throughput degradation in highly congested networks. To address this problem, this paper makes the following two main contri
Publikováno v:
IEEE transactions on parallel and distributed systems
20 (2009): 1641–1652. doi:10.1109/TPDS.2008.256
info:cnr-pdr/source/autori:Gregori E.; Li P.; Fang Y.; Chlamtac I.; Scalabrino N./titolo:How to Effectively Use Multiple Channels in Wireless Mesh Networks/doi:10.1109%2FTPDS.2008.256/rivista:IEEE transactions on parallel and distributed systems (Print)/anno:2009/pagina_da:1641/pagina_a:1652/intervallo_pagine:1641–1652/volume:20
20 (2009): 1641–1652. doi:10.1109/TPDS.2008.256
info:cnr-pdr/source/autori:Gregori E.; Li P.; Fang Y.; Chlamtac I.; Scalabrino N./titolo:How to Effectively Use Multiple Channels in Wireless Mesh Networks/doi:10.1109%2FTPDS.2008.256/rivista:IEEE transactions on parallel and distributed systems (Print)/anno:2009/pagina_da:1641/pagina_a:1652/intervallo_pagine:1641–1652/volume:20
Operating on a frequency band occupying several nonoverlapping channels, IEEE 802.11 is now widely used in Wireless Mesh Networks (WMNs). Many multichannel MAC protocols are proposed to improve the spatial reuse in the network under the assumption th
Publikováno v:
IEEE transactions on vehicular technology Vol. (2009): 3684–3703. doi:10.1109/TVT.2009.2017545
info:cnr-pdr/source/autori:Santi P.; Torrent-Moreno M.; Mittag J.; Hartenstein H./titolo:Vehicle-to-Vehicle Communication: Fair Transmit Power Control for Safety-Critical Information/doi:10.1109%2FTVT.2009.2017545/rivista:IEEE transactions on vehicular technology/anno:2009/pagina_da:3684/pagina_a:3703/intervallo_pagine:3684–3703/volume:Vol.
info:cnr-pdr/source/autori:Santi P.; Torrent-Moreno M.; Mittag J.; Hartenstein H./titolo:Vehicle-to-Vehicle Communication: Fair Transmit Power Control for Safety-Critical Information/doi:10.1109%2FTVT.2009.2017545/rivista:IEEE transactions on vehicular technology/anno:2009/pagina_da:3684/pagina_a:3703/intervallo_pagine:3684–3703/volume:Vol.
Direct radio-based vehicle-to-vehicle communication can help prevent accidents by providing accurate and up-to-date local status and hazard information to the driver. In this paper, we assume that two types of messages are used for traffic safety-rel
Publikováno v:
Computer communications 32 (2009): 896–906. doi:10.1016/j.comcom.2008.12.022
info:cnr-pdr/source/autori:Amato G.; Caruso A.; Chessa S./titolo:Application-driven, energy-efficient communication in wireless sensor networks/doi:10.1016%2Fj.comcom.2008.12.022/rivista:Computer communications/anno:2009/pagina_da:896/pagina_a:906/intervallo_pagine:896–906/volume:32
info:cnr-pdr/source/autori:Amato G.; Caruso A.; Chessa S./titolo:Application-driven, energy-efficient communication in wireless sensor networks/doi:10.1016%2Fj.comcom.2008.12.022/rivista:Computer communications/anno:2009/pagina_da:896/pagina_a:906/intervallo_pagine:896–906/volume:32
Several sensor network applications based on data diffusion and data management can determine the communication transfer rate between two sensors beforehand. In this framework, we consider the problem of energy efficient communication among nodes of
Publikováno v:
IEEE Symposium on Computers and Communications, pp. 210–215, Larnaca, Cipro, 06-09 July 2015
info:cnr-pdr/source/autori:Girolami M.; Chessa S.; Ferro E./congresso_nome:IEEE Symposium on Computers and Communications/congresso_luogo:Larnaca, Cipro/congresso_data:06-09 July 2015/anno:2015/pagina_da:210/pagina_a:215/intervallo_pagine:210–215
ISCC
info:cnr-pdr/source/autori:Girolami M.; Chessa S.; Ferro E./congresso_nome:IEEE Symposium on Computers and Communications/congresso_luogo:Larnaca, Cipro/congresso_data:06-09 July 2015/anno:2015/pagina_da:210/pagina_a:215/intervallo_pagine:210–215
ISCC
CORDIAL is a collaborative service discovery strategy designed for mobile and opportunistic networks, which takes advantage of some features of human behavior, namely the periodicity of movements, the membership to a restricted number of communities
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::3e63482ac75b5372947df765af6f9bf2
http://hdl.handle.net/11568/776011
http://hdl.handle.net/11568/776011