Sciweavers

Share
IWCMC
2006
ACM
10 years 1 months ago
Energy efficient distributed connected dominating sets construction in wireless sensor networks
One important characteristic of wireless sensor networks is energy stringency. Constructing a connected dominating set (CDS) has been widely used as a topology control strategy to...
Yuanyuan Zeng, Xiaohua Jia, Yanxiang He
IWCMC
2006
ACM
10 years 1 months ago
Modeling key agreement in multi-hop ad hoc networks
Securing multicast communications in ad hoc networks has become one of the most challenging research directions in the areas of wireless networking and security. This is especiall...
Giovanni Di Crescenzo, Maria Striki, John S. Baras
IWCMC
2006
ACM
10 years 1 months ago
A simulation study of a MAC layer protocol for wireless networks with asymmetric links
— Asymmetric links are common in wireless networks for a variety of physical, logical, operational, and legal considerations. An asymmetric link supports uni-directional communic...
Guoqiang Wang, Damla Turgut, Ladislau Böl&oum...
IWCMC
2006
ACM
10 years 1 months ago
Load balancing in the call admission control of heterogeneous wireless networks
In the next generation wireless systems (NGWS) the end user will be able to connect to any of the different available access networks. The end user will also be able to roam seaml...
Kamil H. Suleiman, H. Anthony Chan, Mqhele E. Dlod...
IWCMC
2006
ACM
10 years 1 months ago
SINR analysis for V-BLAST with ordered MMSE-SIC detection
A new way to determine the exact layer-wise SINR distribution for V-BLAST with successive interference cancellation at the receiver is presented. In contrast to previous publicati...
Ronald Böhnke, Karl-Dirk Kammeyer
IWCMC
2006
ACM
10 years 1 months ago
Performance evaluation of joint downlink scheduling in multi-cellular OFDMA systems based on IEEE 802.16a
The employment of the OFDMA transmission technique in broadband radio systems shows several benefits. Especially the exploitation of multi-user diversity with the help of sophisti...
Michael Einhaus, Ole Klein, Bernhard Walke, Daniel...
IWCMC
2006
ACM
10 years 1 months ago
TARP: trust-aware routing protocol
Security is a critical issue in a mobile ad hoc network (MANET). In most of the previous protocols security is an added layer above the routing protocol. We propose a TrustAware R...
Loay Abusalah, Ashfaq A. Khokhar, G. BenBrahim, W....
IWCMC
2006
ACM
10 years 1 months ago
A heuristics based approach for cellular mobile network planning
Designing and planning of the switching, signaling and support network is a fairly complex process in cellular mobile network. In this paper, the problem of assigning cells to swi...
Marwan H. Abu-Amara, Sadiq M. Sait, Abdul Subhan
IWCMC
2006
ACM
10 years 1 months ago
A probabilistic voting-based filtering scheme in wireless sensor networks
In this paper, we study the fabricated report with false votes attack and the false votes on real reports attack in wireless sensor networks. Since most of the existing works addr...
Feng Li, Jie Wu
books