Sciweavers

278 search results - page 18 / 56
» Information Acquisition and Exploitation in Multichannel Wir...
Sort
View
TCOM
2011
118views more  TCOM 2011»
14 years 4 months ago
A Joint Network and Channel Coding Strategy for Wireless Decode-and-Forward Relay Networks
—In this paper, we consider a wireless multicast network with multiple sources, relays, and destinations. We adopt a multi-hop decode-and-forward relay protocol such that two can...
Qiang Li, See Ho Ting, Chin Keong Ho
83
Voted
SEUS
2008
IEEE
15 years 4 months ago
Context-Aware Middleware for Reliable Multi-hop Multi-path Connectivity
The widespread diffusion of portable devices with multiple wireless interfaces, e.g., UMTS/GPRS, IEEE 802.11, and/or Bluetooth, is enabling multi-homing and multi-channel scenarios...
Paolo Bellavista, Antonio Corradi, Carlo Giannelli
TMC
2012
13 years 1 days ago
Secure Initialization of Multiple Constrained Wireless Devices for an Unaided User
—A number of protocols and mechanisms have been proposed to address the problem of initial secure key deployment in wireless networks. Most existing approaches work either with a...
Toni Perkovic, Mario Cagalj, Toni Mastelic, Nitesh...
ICDCS
2006
IEEE
15 years 3 months ago
Scalable and Robust Aggregation Techniques for Extracting Statistical Information in Sensor Networks
Wireless sensor networks have stringent constraints on system resources and data aggregation techniques are critically important. However, accurate data aggregation is difficult ...
Hongbo Jiang, Shudong Jin
DSN
2005
IEEE
15 years 3 months ago
Neutralization of Errors and Attacks in Wireless Ad Hoc Networks
This paper proposes and evaluates strategies to build reliable and secure wireless ad hoc networks. Our contribution is based on the notion of inner-circle consistency, where loca...
Claudio Basile, Zbigniew Kalbarczyk, Ravishankar K...