• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 1,206
Next 10 →

AND DELAY SENSITIVE APPLICATIONS IN REAL

by Anuradha Patil, Sridhar K
"... Mobile ad hoc network is network with different applications are developing with different service requirement. In particular multimedia applications and other real-time applications e.g. voice transmission. MANET is a autonomous network where communicating entities can communicate without the aid o ..."
Abstract - Add to MetaCart
Mobile ad hoc network is network with different applications are developing with different service requirement. In particular multimedia applications and other real-time applications e.g. voice transmission. MANET is a autonomous network where communicating entities can communicate without the aid

Efficient Multicast Routing for Delay-Sensitive Applications

by Quan Sun, Horst Langendörfer - in Proc. Second Workshop on Protocols for Multimedia Systems (PROMS , 1995
"... We give a multicast tree construction method for delay-sensitive applications by first trying to compute a constrained low cost tree spanning as many destination nodes as possible and then applying the shortest path algorithm. Experimental results through simulations show that this method greatly im ..."
Abstract - Cited by 33 (0 self) - Add to MetaCart
We give a multicast tree construction method for delay-sensitive applications by first trying to compute a constrained low cost tree spanning as many destination nodes as possible and then applying the shortest path algorithm. Experimental results through simulations show that this method greatly

Decentralized Transmission Strategies for Delay-sensitive Applications over Spectrum Agile Networks

by Aymeric Larcher, Haitong Sun, Mihaela Van Der Schaar, Zhi Ding - in Proc. of International Packet Video Workshop , 2004
"... With the growing demand of radio resources, maximizing spectrum efficiency becomes increasingly important. Traditional static spectrum allocation lacks effective mechanisms for sharing spectral resources. Through adaptive resource allocation, spectrum agility allows the radio devices to dynamically ..."
Abstract - Cited by 8 (0 self) - Add to MetaCart
use the idle spectral band and is becoming increasingly attractive because it can provide a large number of resources for delay sensitive and high-bandwidth applications such as multimedia transmission. In this paper, we show how spectrum agility may be used to satisfy delay sensitive applications

Service Differentiation for Delay-Sensitive Applications: An Optimisation-Based Approach

by Peter Key, Laurent Massoulié, Jonathan K. Shapiro - Tech. Rep., Microsoft Research , 2002
"... This paper deals with the performance of delay-sensitive applications running over a network that offers multiple classes of service, where the adaption of application rates in response to network feedback is the primary mechanism available for controlling quality of service. We first evaluate the g ..."
Abstract - Cited by 2 (1 self) - Add to MetaCart
This paper deals with the performance of delay-sensitive applications running over a network that offers multiple classes of service, where the adaption of application rates in response to network feedback is the primary mechanism available for controlling quality of service. We first evaluate

Spectrum Sharing For Delay-Sensitive Applications With Continuing QoS Guarantees

by Yuanzhang Xiao , Kartik Ahuja , Mihaela Van Der Schaar
"... Abstract-We study a wireless network in which multiple users stream delay-sensitive applications such as video conferencing and video streaming. Existing spectrum sharing policies, which determine when users access the spectrum and at what power levels, are either constant (i.e. users transmit simu ..."
Abstract - Add to MetaCart
Abstract-We study a wireless network in which multiple users stream delay-sensitive applications such as video conferencing and video streaming. Existing spectrum sharing policies, which determine when users access the spectrum and at what power levels, are either constant (i.e. users transmit

Routing Algorithms for Delay-insensitive and Delay-sensitive Applications in Underwater Sensor Networks

by Dario Pompili, Tommaso Melodia, Ian F. Akyildiz - In Proc. of ACM Conference on Mobile Computing and Networking (MobiCom , 2006
"... Underwater sensor networks consist of sensors and vehicles deployed to perform collaborative monitoring tasks over a given region. Underwater sensor networks will find applications in oceanographic data collection, pollution monitoring, offshore exploration, disaster prevention, assisted navigation, ..."
Abstract - Cited by 72 (10 self) - Add to MetaCart
of data gathering is investigated at the network layer by considering the cross-layer interactions between the routing functions and the characteristics of the underwater acoustic channel. Two distributed routing algorithms are introduced for delay-insensitive and delaysensitive applications. The proposed

Extending Greedy Multicast Routing to Delay Sensitive Applications

by Ashish Goel, Kameshwar Munagala , 1999
"... Given a weighted undirected graph G(V; E) and a subset R of V , a Steiner tree is a subtree of G that contains each vertex in R. In this paper, we present an online algorithm for nding a Steiner tree that simultaneously approximates the shortest path tree and the minimum weight Steiner tree, when ..."
Abstract - Cited by 11 (2 self) - Add to MetaCart
, when the vertices in the set R are revealed in an online fashion. This problem arises naturally while trying to construct source-based multicast trees of low cost and good delay. The cost of the tree we construct is within an O(log jRj) factor of the optimal cost, and the path length from the root

Analysis of Individual Flows Performance for Delay Sensitive Applications

by Ricardo Nabhen , Edgard Jamhour , Manoel C Penna , Mauro Fonseca
"... Abstract. SLA management approaches typically adopt provisioning strategies based on aggregate traffic in order to support end-to-end delay requirements of applications. They do not take into account individual flows needs in terms of delay. However, this delay can be very higher than the one obser ..."
Abstract - Add to MetaCart
Abstract. SLA management approaches typically adopt provisioning strategies based on aggregate traffic in order to support end-to-end delay requirements of applications. They do not take into account individual flows needs in terms of delay. However, this delay can be very higher than the one

A Fast Multicast Routing Algorithm for Delay-Sensitive Applications

by Sung-jin Chung, Sung-pil Hong, Hong-Suk Huh , 1997
"... : We propose a heuristic algorithm for delayconstrained minimum cost multicast routing in the packet-switched networks. The algorithm is computationally efficient since, unlike previous heuristics, it does not rely on any enumerative step that generates a set of delay-bounded paths between a pair of ..."
Abstract - Cited by 20 (0 self) - Add to MetaCart
: We propose a heuristic algorithm for delayconstrained minimum cost multicast routing in the packet-switched networks. The algorithm is computationally efficient since, unlike previous heuristics, it does not rely on any enumerative step that generates a set of delay-bounded paths between a pair

A New Distributed Routing Algorithm for Supporting Delay-Sensitive Applications

by Quan Sun, Horst Langendörfer - Computer Communications , 1997
"... We propose a new distributed delay-constrained unicast routing algorithm which can always find a delay-constrained path with small message complexity if such a path exists. At each network node, limited information about the network state is needed and only a small amount of computation is required. ..."
Abstract - Cited by 16 (1 self) - Add to MetaCart
We propose a new distributed delay-constrained unicast routing algorithm which can always find a delay-constrained path with small message complexity if such a path exists. At each network node, limited information about the network state is needed and only a small amount of computation is required
Next 10 →
Results 1 - 10 of 1,206
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University