Sciweavers

68 search results - page 14 / 14
» C-MAC: An Energy-Efficient MAC Scheme Using Chinese-Remainde...
Sort
View
ESAS
2004
Springer
13 years 10 months ago
Public Key Cryptography in Sensor Networks - Revisited
The common perception of public key cryptography is that it is complex, slow and power hungry, and as such not at all suitable for use in ultra-low power environments like wireless...
Gunnar Gaubatz, Jens-Peter Kaps, Berk Sunar
ICC
2008
IEEE
158views Communications» more  ICC 2008»
13 years 11 months ago
Improving WSN Simulation and Analysis Accuracy Using Two-Tier Channel Models
— Accurate simulation and analysis of wireless protocols and systems is inherently dependent on an accurate model of the underlying channel. In this paper, we show that residual ...
Adnan Iqbal, Syed Ali Khayam
IPSN
2010
Springer
14 years 4 days ago
User-centric radio power control for opportunistic mountain hiking networks
bstract: User-Centric Radio Power Control for Opportunistic Mountain Hiking Networks ∗ Jyh-How Huang1 , Po-Yen Lin1 , Yu-Te Huang2 , Seng-Yong Lau1 , Ling-Jyh Chen2 , Kun-chan La...
Jyh-How Huang, Po-Yen Lin, Yu-Te Huang, Seng-Yong ...