We propose a greedy algorithm to investigate the problem of how to schedule of a set of feasible transmissions under physical interference model. We also consider the fairness in s...
The multi-homing technology can provide an extended coverage area via distinct access technologies. Also, it is able to redirect a flow from one interface to another without reinit...
This paper represents a new clustering approach for wireless sensor network. It is a decentralized algorithm having the topology control information in each sensor node. A post lea...
Md. Obaidur Rahman, Byung Goo Choi, Muhammad Mosta...
This paper proposes an efficient approach for managing the security in WSN. Our approach uses the notion of public key cryptography in which two different keys are used for encrypt...