Sciweavers

10044 search results - page 140 / 2009
» Authentication in Wireless Networks
Sort
View
NOMS
2010
IEEE
172views Communications» more  NOMS 2010»
14 years 10 months ago
WiMFlow: a distributed, self-adaptive architecture for flow monitoring in Wireless Mesh Networks
—We present WiMFlow, a dynamic and self-organized flow monitoring framework in Wireless Mesh Networks. The protocol allows for an autonomic organization of the probes, with the ...
Cristian Popi, Olivier Festor
112
Voted
MOBIHOC
2004
ACM
15 years 11 months ago
A scalable approach for reliable downstream data delivery in wireless sensor networks
There exist several applications of sensor networks where reliability of data delivery can be critical. While the redundancy inherent in a sensor network might increase the degree...
Seung-Jong Park, Ramanuja Vedantham, Raghupathy Si...
SASN
2003
ACM
15 years 4 months ago
A security design for a general purpose, self-organizing, multihop ad hoc wireless network
We present a security design for a general purpose, selforganizing, multihop ad hoc wireless network, based on the IEEE 802.15.4 low-rate wireless personal area network standard. ...
Thomas S. Messerges, Johnas Cukier, Tom A. M. Keve...
TCOM
2011
183views more  TCOM 2011»
14 years 6 months ago
Multi-Antenna Communication in Ad Hoc Networks: Achieving MIMO Gains with SIMO Transmission
—The benefit of multi-antenna receivers is investigated in wireless ad hoc networks, and the main finding is that network throughput can be made to scale linearly with the numb...
Nihar Jindal, Jeffrey G. Andrews, Steven Weber
77
Voted
WCNC
2010
IEEE
15 years 3 months ago
Planning of Relay Station Locations in IEEE 802.16 (WiMAX) Networks
— Broadband wireless access networks have received tremendous attention in terms of research and development in the recent years. There have also been test networks deployed in m...
Zakhia G. Abichar, Ahmed E. Kamal, J. Morris Chang