Sciweavers

1183 search results - page 118 / 237
» Direction assignment in wireless networks
Sort
View
147
Voted
ICDCS
2006
IEEE
15 years 11 months ago
Self-Protection for Wireless Sensor Networks
Wireless sensor networks have recently been suggested for many surveillance applications such as object monitoring, path protection, or area coverage. Since the sensors themselves...
Dan Wang, Qian Zhang, Jiangchuan Liu
ICIP
2002
IEEE
16 years 6 months ago
An improved error control paradigm for multimedia transmission over wireless networks
Providing quality-of-service (QoS) guarantees over wireless packet networks requires thorough understanding and quantification of the interactions among the traffic source, the wi...
Mohamed F. Mansour, Abed Elhamid Lawabni, Ahmed H....
160
Voted
ADHOC
2006
87views more  ADHOC 2006»
15 years 5 months ago
Medium Access Control protocols for ad hoc wireless networks: A survey
Studies of ad hoc wireless networks are a relatively new field gaining more popularity for various new applications. In these networks, the Medium Access Control (MAC) protocols a...
Sunil Kumar, Vineet S. Raghavan, Jing Deng
ICPPW
2003
IEEE
15 years 10 months ago
Perfect Secrecy in Wireless Networks
In a classic paper, among a multitude of other security issues, Claude E. Shannon defined perfect secrecy for a pair of secure computers communicating over an insecure link. The ...
Phillip G. Bradford, Olga V. Gavrylyako, Randy K. ...
158
Voted
IJSNET
2007
91views more  IJSNET 2007»
15 years 5 months ago
SUMP: a secure unicast messaging protocol for wireless ad hoc sensor networks
: Most wireless ad hoc sensor networks are susceptible to routing level attacks, in which an adversary masquerades as a legitimate node to convince neighbouring nodes that it is th...
Jeff Janies, Chin-Tser Huang, Nathan L. Johnson, T...