Sciweavers

2268 search results - page 122 / 454
» Modeling wireless shadow networks
Sort
View
PERCOM
2004
ACM
16 years 4 months ago
Models, Protocols, and Architectures for Secure Pervasive Computing: Challenges and Research Directions
We explore the challenges and research directions in building models, protocols and architectures to support security in pervasive computing environments. We argue that to be succ...
Roshan K. Thomas, Ravi S. Sandhu
130
Voted
CEE
2006
75views more  CEE 2006»
15 years 4 months ago
Survivability and performance optimization of mobile wireless communication networks in the event of base station failure
In this paper, we investigate the survivability of mobile wireless communication networks in the event of base station (BS) failure. A survivable network is modeled as a mathemati...
Kuo-Chung Chu, Frank Yeong-Sung Lin
GLOBECOM
2007
IEEE
15 years 11 months ago
End-to-End Throughput-Aware Channel Assignment in Multi-Radio Wireless Mesh Networks
— 1 Wireless mesh networks are deployed as broadband backbones to provide ubiquitous wireless access for residents and local businesses. Utilizing multiple channels has the poten...
Fei Ye, Qing Chen, Zhisheng Niu
ICC
2007
IEEE
186views Communications» more  ICC 2007»
15 years 11 months ago
A Spreading Code MAC Protocol for Multi-Hop Wireless Ad Hoc Networks
— We propose a spreading code medium access control (MAC) protocol with each node equipped with single transceiver for wireless ad hoc networks, based on the code division multip...
Hang Su, Xi Zhang
SODA
2010
ACM
151views Algorithms» more  SODA 2010»
16 years 2 months ago
A Max-Flow/Min-Cut Algorithm for a Class of Wireless Networks
The linear deterministic model of relay channels is a generalization of the traditional directed network model which has become popular in the study of the flow of information ove...
S. M. Sadegh Tabatabaei Yazdi, Serap A. Savari