Sciweavers

10044 search results - page 173 / 2009
» Authentication in Wireless Networks
Sort
View
AISM
2004
15 years 5 months ago
SOHO Wireless Intrusion Detection Systems - Cure or Placebo
Growth of wireless home networking solutions has meant that household computers are now not just connected to the Internet and each other but to passers-by on the street. It is th...
Peter Wolski
MOBIHOC
2008
ACM
16 years 3 months ago
BEND: MAC-layer proactive mixing protocol for network coding in multi-hop wireless networks
We present BEND, a MAC layer solution to practical network coding in multi-hop wireless networks. It is the first exploration of the broadcasting nature of wireless channels to pr...
Jian Zhang
INFOCOM
2009
IEEE
15 years 10 months ago
Cooperative Network Coding-Aware Routing for Multi-Rate Wireless Networks
—Recent research has proven that network coding has great potential to improve network throughput in wireless networks. To fully exploit the performance gain brought by network c...
Jin Zhang, Qian Zhang
TIT
2008
81views more  TIT 2008»
15 years 3 months ago
Large Deviations of the Interference in a Wireless Communication Model
Interference from other users limits the capacity, and possibly the connectivity, of wireless networks. A simple model of a wireless ad-hoc network, in which node locations are des...
Ayalvadi J. Ganesh, Giovanni Luca Torrisi
INFOCOM
2007
IEEE
15 years 10 months ago
Performance of Random Access Scheduling Schemes in Multi-Hop Wireless Networks
Abstract— The performance of scheduling schemes in multihop wireless networks has attracted significant attention in the recent literature. It is well known that optimal schedul...
Changhee Joo, Ness B. Shroff