Sciweavers

10044 search results - page 1886 / 2009
» Authentication in Wireless Networks
Sort
View
ICC
2007
IEEE
153views Communications» more  ICC 2007»
15 years 11 months ago
An End-to-End Technique to Estimate the Transmission Rate of an IEEE 802.11 WLAN
— The deployment of wireless LANs (WLANs) has been steadily increasing over the years and estimating the actual bit rate of a WLAN device is important for management and applicat...
Antonio Augusto de Aragão Rocha, Rosa Maria...
ICC
2007
IEEE
112views Communications» more  ICC 2007»
15 years 11 months ago
A Collision-free Based Rotational Listening Strategy (RLS) for IEEE 802.15.4 WPAN
— The standard IEEE 802.15.4 medium access control (MAC) protocol is designed for low-power transmissions in low-rate and short-distance wireless personal area networks (WPANs). ...
Shiann-Tsong Sheu, Yun-Yen Shih
130
Voted
ICC
2007
IEEE
15 years 11 months ago
RARE - Resource Aware Routing for mEsh
— An important element of any routing protocol used for Wireless Mesh Networks (WMNs) is the link cost function used to represent the radio link characteristic. The majority of t...
Karol Kowalik, Brian Keegan, Mark Davis
144
Voted
ICCCN
2007
IEEE
15 years 11 months ago
On Improving the Precision of Localization with Minimum Resource Allocation
— Autonomous localization of nodes in wireless sensor networks is essential to minimize the complex self organization task and consequently enhancing the overall network lifetime...
Frank Reichenbach, Dirk Timmermann
INFOCOM
2007
IEEE
15 years 11 months ago
SPREAD: Foiling Smart Jammers Using Multi-Layer Agility
— In this paper, we address the problem of cross-layer denial of service attack in wireless data networks. We introduce SPREAD - a novel adaptive diversification approach to pro...
Xin Liu, Guevara Noubir, Ravi Sundaram, San Tan
« Prev « First page 1886 / 2009 Last » Next »