Sciweavers

31 search results - page 6 / 7
» Energy Cost Optimization by Adequate Transmission Rate Divid...
Sort
View
INFOCOM
2010
IEEE
13 years 4 months ago
Maximum Damage Malware Attack in Mobile Wireless Networks
—Malware attacks constitute a serious security risk that threatens to slow down the large scale proliferation of wireless applications. As a first step towards thwarting this se...
M. H. R. Khouzani, Saswati Sarkar, Eitan Altman
WOWMOM
2005
ACM
109views Multimedia» more  WOWMOM 2005»
13 years 11 months ago
On Maximizing Lifetime of a Sensor Cluster
We consider the energy consumed in radio transmission of a set of sensors forming a data gathering wireless network. Our objective is to enhance the lifetime of such networks by e...
Samar Agnihotri, Pavan Nuggehalli, H. S. Jamadagni
TWC
2008
85views more  TWC 2008»
13 years 5 months ago
Bandwidth partitioning in decentralized wireless networks
This paper addresses the following question, which is of interest in the design of a multiuser decentralized network. Given a total system bandwidth of W Hz and a fixed data rate c...
Nihar Jindal, Jeffrey G. Andrews, Steven Weber
WMI
2001
114views more  WMI 2001»
13 years 7 months ago
A high capacity multihop packet CDMA wireless network
: An adhoc network is a collection of wireless mobile nodes dynamically forming a temporary network without the use of any existing network infrastructure or centralized administra...
Ali Nabi Zadeh, Bijan Jabbari
JCP
2008
142views more  JCP 2008»
13 years 5 months ago
QoS Aware Query Processing Algorithm for Wireless Sensor Networks
In sensor networks, continuous query is commonly used for collecting periodical data from the objects under monitoring. This sort of queries needs to be carefully designed, in orde...
Jun-Zhao Sun