Sciweavers

99 search results - page 16 / 20
» Downlink Distributed Beamforming through Relay Networks
Sort
View
JCIT
2008
245views more  JCIT 2008»
14 years 9 months ago
Quality of Service (QoS) of Voice over MAC Protocol 802.11 using NS-2
Transmitting voice through IP data network can provide significant cost savings. However if not managed properly, voice quality can degrade due to data network congestion. Voice o...
Dileep Kumar, Saleem Ahmed, Yeonseung Ryu
ICDCSW
2003
IEEE
15 years 2 months ago
LHAP: A Lightweight Hop-by-Hop Authentication Protocol for Ad-Hoc Networks
Most ad hoc networks do not implement any network access control, leaving these networks vulnerable to resource consumption attacks where a malicious node injects packets into the...
Sencun Zhu, Shouhuai Xu, Sanjeev Setia, Sushil Jaj...
ICC
2009
IEEE
197views Communications» more  ICC 2009»
15 years 4 months ago
A Game-Based Self-Organizing Uplink Tree for VoIP Services in IEEE 802.16j Networks
— In this paper, we propose a game theoretical approach to tackle the problem of the distributed formation of the uplink tree structure among the relay stations (RSs) and their s...
Walid Saad, Zhu Han, Mérouane Debbah, Are H...
ICC
2009
IEEE
106views Communications» more  ICC 2009»
15 years 4 months ago
Distributed ECN-Based Congestion Control
—Following the design philosophy of XCP, VCP is a router-assisted congestion protocol that intends to balance the efficiency and the fairness control in high Bandwidth-Delay Pro...
Xiaolong Li, Homayoun Yousefi'zadeh
IFIP
2007
Springer
15 years 3 months ago
Detecting Wormhole Attacks in Wireless Sensor Networks
Wormhole attacks can destabilize or disable wireless sensor networks. In a typical wormhole attack, the attacker receives packets at one point in the network, forwards them through...
Yurong Xu, Guanling Chen, James Ford, Fillia Maked...