Sciweavers

1692 search results - page 268 / 339
» Evaluation of Security Mechanisms in Wireless Sensor Network...
Sort
View
SAC
2011
ACM
14 years 2 months ago
Tracking continuous topological changes of complex moving regions
A moving region whose location and extend change over time can imply topological changes such as region split and hole formation. To study this phenomenon is useful in many applic...
Hechen Liu, Markus Schneider
GLOBECOM
2009
IEEE
15 years 6 months ago
Adaptive Probabilistic Medium Access in MPR-Capable Ad-Hoc Wireless Networks
—Medium access in ad-hoc wireless networks must be performed in a distributed fashion due to lack of coordination between nodes. Specifically, when nodes are capable of receivin...
Majid Ghanbarinejad, Christian Schlegel, Pawel Gbu...
MOBICOM
1999
ACM
15 years 4 months ago
WTCP: A Reliable Transport Protocol for Wireless Wide-Area Networks
Wireless wide-area networks (WWANs) are characterized by very low and variable bandwidths, very high and variable delays, significant non-congestion related losses, asymmetric upl...
Prasun Sinha, Narayanan Venkitaraman, Raghupathy S...
ICDCS
2008
IEEE
15 years 6 months ago
DCAR: Distributed Coding-Aware Routing in Wireless Networks
—Recently, there has been a growing interest of using network coding to improve the performance of wireless networks, for example, authors of [1] proposed the practical wireless ...
Jilin Le, John C. S. Lui, Dah-Ming Chiu
CORR
2012
Springer
198views Education» more  CORR 2012»
13 years 7 months ago
Token-DCF: An Opportunistic MAC protocol for Wireless Networks
—IEEE 802.11 DCF is the MAC protocol currently used in wireless LANs. 802.11 DCF is inefficient due to two types of overhead; channel idle time and collision time. This paper pr...
Ghazale Hosseinabadi, Nitin H. Vaidya