Sciweavers

10044 search results - page 216 / 2009
» Authentication in Wireless Networks
Sort
View
AINA
2007
IEEE
15 years 10 months ago
Cost-Function-Based Network Selection Strategy in Integrated Wireless and Mobile Networks
—Wireless and mobile networks have experienced great success over the past few years. However, any single type of wireless and mobile network cannot provide all types of services...
Wei Shen, Qing-An Zeng
CORR
2008
Springer
73views Education» more  CORR 2008»
15 years 4 months ago
Energy Benefit of Network Coding for Multiple Unicast in Wireless Networks
We show that the maximum possible energy benefit of network coding for multiple unicast on wireless networks is at least 3. This improves the previously known lower bound of 2.4 f...
Jasper Goseling, Jos H. Weber
ICDCSW
2005
IEEE
15 years 10 months ago
A Topologically-Aware Worm Propagation Model for Wireless Sensor Networks
Internet worms have repeatedly revealed the susceptibility of network hosts to malicious intrusions. Recent studies have proposed to employ the underlying principles of worm propa...
Syed A. Khayam, Hayder Radha
MOBICOM
2003
ACM
15 years 9 months ago
DIRAC: a software-based wireless router system
Routers are expected to play an important role in the IPbased wireless data network. Although a substantial number of techniques have been proposed to improve wireless network per...
Petros Zerfos, Gary Zhong, Jerry Cheng, Haiyun Luo...
MOBIHOC
2006
ACM
16 years 4 months ago
Throughput and delay optimization in interference-limited multihop networks
The performance of a multihop wireless network is typically affected by the interference caused by transmissions in the same network. In a statistical fading environment, the inte...
Ahmed Bader, Eylem Ekici