131
click to vote
ICNP
15 years 6 months ago
2003 IEEE
In some harsh environments, manually deploying sensors is impossible. Alternative methods may lead to imprecise placement resulting in coverage holes. To provide the required high...
104
click to vote
ICNP
15 years 6 months ago
2003 IEEE
This paper presents an analytical model to compute the average service time and jitter experienced by a packet when transmitted in a saturated IEEE 802.11 ad hoc network. In contr...
135
click to vote
ICNP
15 years 6 months ago
2003 IEEE
Abstract—In the paper, we devise and evaluate a fully decentralized, light-weight, dynamic clustering algorithm for target tracking. Instead of assuming the same role for all the...
130
click to vote
ICNP
15 years 6 months ago
2003 IEEE
We consider the problem of distributing “live” streaming media content to a potentially large and highly dynamic population of hosts. Peer-to-peer content distribution is attr...
106
click to vote
ICNP
15 years 6 months ago
2003 IEEE
A prerequisite for secure communication between two nodes in an ad hoc network is that the nodes share a key to bootstrap their trust relationship. In this paper, we present a sca...
|