Sciweavers

ADHOC
2016
87views Database» more  ADHOC 2016»
8 years 5 months ago
Integration of scheduling and network coding in multi-rate wireless mesh networks: Optimization models and algorithms
Y-networks: An abstraction of collection tree in sensor networks. ACM Transactions on Sensor Networks, 11(4), 1-24. <a href="http://dx.doi.org/10.1145/2764459">[Mor...
Zhaolong Ning, Qingyang Song, Lei Guo 0005, Zhikui...
ADHOC
2016
53views Database» more  ADHOC 2016»
8 years 5 months ago
Establishing location-privacy in decentralized long-distance geocast services
—The ability to communicate over long distances is of central importance for smart traffic applications like cooperative route planning or the discovery and reservation of charg...
Martin Florian, Felix Pieper, Ingmar Baumgart
ADHOC
2016
62views Database» more  ADHOC 2016»
8 years 5 months ago
On the displacement for covering a d-dimensional cube with randomly placed sensors
Consider n sensors placed randomly and independently with the uniform distribution in a d−dimensional unit cube (d ≥ 2). The sensors have identical sensing range equal to r, f...
Rafal Kapelko, Evangelos Kranakis
ADHOC
2016
48views Database» more  ADHOC 2016»
8 years 5 months ago
Decentralized robust spectrum allocation for cognitive radio wireless mesh networks
During the last decade we have seen an explosive growth in the deployment of wireless networks in unlicensed frequency bands, mainly driven by the great success of the IEEE 802.11...
Germán Capdehourat, Federico Larroca, Pablo...
ADHOC
2016
51views Database» more  ADHOC 2016»
8 years 5 months ago
Opportunistic communications based on distributed width-controllable braided multipath routing in wireless sensor networks
Multipath routing, especially braided multipath routing (BMR), has become a powerful tool to provide reliable and energy-efficient packet transmissions against wireless links loss...
Xinjiang Sun, Hao Chen, Xiaobei Wu, Xinjie Yin, We...
ADHOC
2016
55views Database» more  ADHOC 2016»
8 years 5 months ago
Security of electrostatic field persistent routing: Attacks and defense mechanisms
—Electrostatic Field-based Routing (EFR) is a form of geographical multi-path routing where packets are routed along a collection of electrostatic field lines, defined by elect...
Oliviu C. Ghica, Cristina Nita-Rotaru, Goce Trajce...
ADHOC
2016
60views Database» more  ADHOC 2016»
8 years 5 months ago
Key evolving RFID systems: Forward/backward privacy and ownership transfer of RFID tags
RFID, which stands for Radio Frequency Identification, is a relatively new technology often envisioned as an enabler of the Internet of Things. The widespread use of this technol...
Tassos Dimitriou