Sciweavers

1524 search results - page 256 / 305
» Adapting BitTorrent to Wireless Ad Hoc Networks
Sort
View
IJSN
2006
140views more  IJSN 2006»
14 years 9 months ago
Load-balanced key establishment methodologies in wireless sensor networks
: Wireless Sensor Networks (WSN) pose a need for dynamically establishing a secret key joint to a group of nodes. Elliptic Curve Cryptography (ECC) has emerged as a suitable public...
Ortal Arazi, Hairong Qi
TPDS
2008
178views more  TPDS 2008»
14 years 9 months ago
On-Demand Medium Access in Multihop Wireless Networks with Multiple Beam Smart Antennas
The paper presents a detailed discussion of various issues involved in designing a medium access control (MAC) protocol for multihop wireless networks with nodes employing multiple...
Vivek Jain, Anurag Gupta, Dharma P. Agrawal
ICC
2009
IEEE
145views Communications» more  ICC 2009»
14 years 7 months ago
Distributed and Power Efficient Routing in Wireless Cooperative Networks
Most ad hoc mobile devices in wireless networks operate on batteries and power consumption is therefore an important issue for wireless network design. In this paper, we propose an...
Zhengguo Sheng, Zhiguo Ding, Kin K. Leung
ICIP
2002
IEEE
15 years 11 months ago
SPIN-IT: a data centric routing protocol for image retrieval in wireless networks
In this paper, we propose and analyze a routing protocol for mobile ad hoc networks that supports efficient image retrieval based on metadata queries. In digital photography, meta...
Edward Woodrow, Wendi Rabiner Heinzelman
DCOSS
2010
Springer
15 years 1 months ago
Wormholes No More? Localized Wormhole Detection and Prevention in Wireless Networks
A number of protocols have been proposed to date to defend against wormhole attacks in wireless networks by adopting synchronized clocks, positioning devices, or directional antenn...
Tassos Dimitriou, Thanassis Giannetsos