Sciweavers

Share
warning: Creating default object from empty value in /var/www/modules/taxonomy/taxonomy.module on line 1416.
MOBICOM
2006
ACM
11 years 5 months ago
OURS: optimal unicast routing systems in non-cooperative wireless networks
We propose novel solutions for unicast routing in wireless networks consisted of selfish terminals: in order to alleviate the inevitable over-payment problem (and thus economic i...
Weizhao Wang, Xiang-Yang Li, Stephan Eidenbenz, Yu...
MOBICOM
2006
ACM
11 years 5 months ago
Boundary recognition in sensor networks by topological methods
Wireless sensor networks are tightly associated with the underlying environment in which the sensors are deployed. The global topology of the network is of great importance to bot...
Yue Wang, Jie Gao, Joseph S. B. Mitchell
MOBICOM
2006
ACM
11 years 5 months ago
Component based channel assignment in single radio, multi-channel ad hoc networks
In this paper, we consider the channel assignment problem in single radio multi-channel mobile ad-hoc networks. Specifically, we investigate the granularity of channel assignment...
Ramanuja Vedantham, Sandeep Kakumanu, Sriram Laksh...
MOBICOM
2006
ACM
11 years 5 months ago
Increasing broadcast reliability in vehicular ad hoc networks
Broadcast transmissions are the predominate form of network traffic in a VANET. However, since there is no MAC-layer recovery on broadcast frames within an 802.11-based VANET, th...
Nathan Balon, Jinhua Guo
MOBICOM
2006
ACM
11 years 5 months ago
Analysis and implications of student contact patterns derived from campus schedules
Characterizing mobility or contact patterns in a campus environment is of interest for a variety of reasons. Existing studies of these patterns can be classified into two basic a...
Vikram Srinivasan, Mehul Motani, Wei Tsang Ooi
MOBICOM
2006
ACM
11 years 5 months ago
An identity-based security framework For VANETs
We present a security framework for Vehicular Ad hoc Networks (VANETs), using identity-based cryptography, to provide authentication, confidentiality, non-repudiation and message...
Pandurang Kamat, Arati Baliga, Wade Trappe
MOBICOM
2006
ACM
11 years 5 months ago
On the complexity of scheduling in wireless networks
We consider the problem of throughput-optimal scheduling in wireless networks subject to interference constraints. We model the interference using a family of K-hop interference m...
Gaurav Sharma, Ravi R. Mazumdar, Ness B. Shroff
MOBICOM
2006
ACM
11 years 5 months ago
A replica distrubution scheme for location-dependent information on vehicular ad hoc networks
In this paper we propose Road-aware Skip Copy (RSC) method for distributing replicas of location-dependent data on server-less vehicular ad hoc networks in urban areas. In the RSC...
M. Yamanaka, G. Tsuchida, S. Ishihara
MOBICOM
2006
ACM
11 years 5 months ago
Double rulings for information brokerage in sensor networks
We study the problem of information brokerage in sensor networks, where information consumers (sinks, users) search for data acquired by information producers (sources). Innetwork...
Rik Sarkar, Xianjin Zhu, Jie Gao
books