Sciweavers

Share
warning: Creating default object from empty value in /var/www/modules/taxonomy/taxonomy.module on line 1416.
MOBIHOC
2007
ACM
11 years 3 months ago
Secure incentives for commercial ad dissemination in vehicular networks
Vehicular ad hoc networks (VANETs) are envisioned to provide us with numerous interesting services in the near future. One of the most promising applications is the dissemination ...
Suk-Bok Lee, Gabriel Pan, Joon-Sang Park, Mario Ge...
MOBIHOC
2007
ACM
11 years 3 months ago
Complexity in geometric SINR
In this paper we study the problem of scheduling wireless links in the geometric SINR model, which explicitly uses the fact that nodes are distributed in the Euclidean plane. We p...
Olga Goussevskaia, Yvonne Anne Oswald, Roger Watte...
MOBIHOC
2007
ACM
11 years 3 months ago
Bounds for the capacity of wireless multihop networks imposed by topology and demand
Existing work on the capacity of wireless networks predominantly considers homogeneous random networks with random work load. The most relevant bounds on the network capacity, e.g...
Alireza Keshavarz-Haddad, Rudolf H. Riedi
MOBIHOC
2007
ACM
11 years 3 months ago
Allocating dynamic time-spectrum blocks in cognitive radio networks
A number of studies have shown the abundance of unused spectrum in the TV bands. This is in stark contrast to the overcrowding of wireless devices in the ISM bands. A recent trend...
Yuan Yuan, Paramvir Bahl, Ranveer Chandra, Thomas ...
MOBIHOC
2007
ACM
11 years 3 months ago
Outlier detection in sensor networks
Outlier detection has many important applications in sensor networks, e.g., abnormal event detection, animal behavior change, etc. It is a difficult problem since global informati...
Bo Sheng, Qun Li, Weizhen Mao, Wen Jin
MOBIHOC
2007
ACM
11 years 3 months ago
Containing denial-of-service attacks in broadcast authentication in sensor networks
Broadcast authentication is an important application in sensor networks. Public Key Cryptography (PKC) is desirable for this application, but due to the resource constraints on se...
Ronghua Wang, Wenliang Du, Peng Ning
MOBIHOC
2007
ACM
11 years 3 months ago
Capacity of a wireless ad hoc network with infrastructure
In this paper we study the capacity of wireless ad hoc networks with infrastructure support of an overlay of wired base stations. Such a network architecture is often referred to ...
Benyuan Liu, Patrick Thiran, Donald F. Towsley
MOBIHOC
2007
ACM
11 years 3 months ago
The multicast capacity of large multihop wireless networks
We consider wireless ad hoc networks with a large number of users. Subsets of users might be interested in identical information, and so we have a regime in which several multicas...
Srinivas Shakkottai, Xin Liu, R. Srikant
books