Sciweavers

1412 search results - page 107 / 283
» Medium access control in wireless sensor networks
Sort
View
INFOCOM
2007
IEEE
15 years 4 months ago
Aloha-Based MAC Protocols with Collision Avoidance for Underwater Acoustic Networks
— Unlike terrestrial networks that mainly rely on radio waves for communications, underwater networks utilize acoustic waves, which have comparatively lower loss and longer range...
Nitthita Chirdchoo, Wee-Seng Soh, Kee Chaing Chua
NETWORK
2006
177views more  NETWORK 2006»
14 years 9 months ago
Jamming sensor networks: attack and defense strategies
Wireless sensor networks are built upon a shared medium that makes it easy for adversaries to conduct radio interference, or jamming, attacks that effectively cause a denial of se...
Wenyuan Xu, Ke Ma, Wade Trappe, Yanyong Zhang
IJSNET
2008
94views more  IJSNET 2008»
14 years 10 months ago
Connection data rate optimisation of IEEE 802.15.3 scatternets with multirate carriers
: Designed for high rate Wireless Personal Area Networks (WPANs), the IEEE 802.15.3 Medium Access Control (MAC) protocol supports peer-to-peer communications in a piconet. In this ...
Zhanping Yin, Victor C. M. Leung
ICC
2008
IEEE
176views Communications» more  ICC 2008»
15 years 4 months ago
Reliable Transport with Memory Consideration in Wireless Sensor Networks
—Wireless sensor networks are often composed of resource-constrained sensor nodes with limited memory space, computational capacity and communication range. The links in WSN are ...
Hongchao Zhou, Xiaohong Guan, Chengjie Wu
SSS
2009
Springer
209views Control Systems» more  SSS 2009»
15 years 4 months ago
CFlood: A Constrained Flooding Protocol for Real-time Data Delivery in Wireless Sensor Networks
Real-time performance is critical for many time-sensitive applications of wireless sensor networks. We present a constrained flooding protocol, called CFlood that enhances the dea...
Bo Jiang, Binoy Ravindran, Hyeonjoong Cho