Sciweavers

900 search results - page 103 / 180
» A Robust Interference Model for Wireless Ad-Hoc Networks
Sort
View
DEXAW
2007
IEEE
199views Database» more  DEXAW 2007»
15 years 1 months ago
Dealing with Sporadic Strangers, or the (Un)Suitability of Trust for Mobile P2P Security
A number of factors, such as the increasing popularity of wireless networks, the opportunities offered by 3G services, and the rapid proliferation of mobile devices, have stimulat...
Esther Palomar, Juan M. Estévez-Tapiador, J...
CNSR
2004
IEEE
15 years 1 months ago
Trusted Route Discovery with TORA Protocol
An ad-hoc network is formed when a group of wireless nodes pledge to help each other in passing packets based upon a pre-agreed protocol. Temporally Ordered Routing Algorithm (TOR...
Asad Amir Pirzada, Chris McDonald
75
Voted
INFOCOM
2010
IEEE
14 years 8 months ago
Estimating Link Reliability in Wireless Networks: An Empirical Study and Interference Modeling
This is a supplementary document for explaining what we could not contain in the main paper. I. BASIC FUNCTIONS AND NOTATIONS In this section, we first define some useful functi...
Shinuk Woo, Hwangnam Kim
IWCMC
2009
ACM
15 years 2 months ago
Interference and throughput analyses in dual-polarized wireless networks subject to Rayleigh fading
This paper investigates the impact of the polarization on the achievable throughput and the probability of successful transmission in the cellular network architectures. A channel...
Jean-Michel Dricot, François Horlin, Philip...
SIGMETRICS
2011
ACM
229views Hardware» more  SIGMETRICS 2011»
14 years 19 days ago
Model-driven optimization of opportunistic routing
Opportunistic routing aims to improve wireless performance by exploiting communication opportunities arising by chance. A key challenge in opportunistic routing is how to achieve ...
Eric Rozner, Mi Kyung Han, Lili Qiu, Yin Zhang