Sciweavers

2282 search results - page 412 / 457
» Detecting Compromised Nodes in Wireless Sensor Networks
Sort
View
RAID
2010
Springer
15 years 11 days ago
Anomaly Detection and Mitigation for Disaster Area Networks
Abstract. One of the most challenging applications of wireless networking are in disaster area networks where lack of infrastructure, limited energy resources, need for common oper...
Jordi Cucurull, Mikael Asplund, Simin Nadjm-Tehran...
EWSN
2006
Springer
16 years 1 months ago
f-MAC: A Deterministic Media Access Control Protocol Without Time Synchronization
Nodes in a wireless network transmit messages through a shared medium. Thus, a Media Access Control (MAC) protocol is necessary to regulate and coordinate medium access. For some a...
André M. Barroso, Cormac J. Sreenan, Utz Ro...
MOBIHOC
2008
ACM
16 years 1 months ago
P2P-based routing and data management using the virtual cord protocol (VCP)
We present Virtual Cord Protocol (VCP), a virtual relative position based routing protocol for sensor networks that also provides methods for data management as known from standar...
Abdalkarim Awad, Reinhard German, Falko Dressler
WONS
2005
IEEE
15 years 7 months ago
Fast Distributed Algorithm for Convergecast in Ad Hoc Geometric Radio Networks
—Wireless ad hoc radio networks have gained a lot of attention in recent years. We consider geometric networks, where nodes are located in a euclidean plane. We assume that each ...
Alexander Kesselman, Dariusz R. Kowalski
MSN
2007
Springer
208views Sensor Networks» more  MSN 2007»
15 years 8 months ago
QoS-Aware Cooperative and Opportunistic Scheduling Exploiting Multi-user Diversity for Rate Adaptive Ad Hoc Networks
— The recent researches in wireless networks prompt the opportunistic transmission that exploiting channel fluctuations to improve the overall system performance. In wireless ad...
Zhisheng Niu