Sciweavers

10044 search results - page 204 / 2009
» Authentication in Wireless Networks
Sort
View
GLOBECOM
2006
IEEE
15 years 10 months ago
Survivable Wireless Access Network Design with Dual-homing Capabilities
— With the growth of mobile users and the increasing deployment of wireless access network infrastructures, the issue of quality of service is becoming an important component of ...
Mohammad Masud Hasan, Xiaodong Huang, Jason P. Jue
GLOBECOM
2006
IEEE
15 years 10 months ago
A New MAC Protocol for Wireless Packet Networks
— Medium access control (MAC) protocols for wireless packet networks usually need to be distributed for flexibility and robustness. In a distributed way, however, collision dete...
Jun Peng, Liang Cheng, Biplab Sikdar
ICDCS
2010
IEEE
15 years 8 months ago
How Wireless Power Charging Technology Affects Sensor Network Deployment and Routing
—As wireless power charging technology emerges, some basic principles in sensor network design are changed accordingly. Existing sensor node deployment and data routing strategie...
Bin Tong, Zi Li, Guiling Wang, Wensheng Zhang
ICC
2007
IEEE
254views Communications» more  ICC 2007»
15 years 8 months ago
Group Rekeying Schemes for Secure Group Communication in Wireless Sensor Networks
Wireless sensor networks are promising solutions for many applications. However, wireless sensor nodes suffer from many constraints such as low computation capability, small memory...
Yong Wang, Byrav Ramamurthy
CATA
2003
15 years 5 months ago
Efficient Even Distribution of Power Consumption in Wireless Sensor Networks
One of the limitations of wireless sensor nodes is their inherent limited energy resource. Besides maximizing the lifetime of the sensor node, it is preferable to distribute the e...
Ioan Raicu