Sciweavers

2268 search results - page 126 / 454
» Modeling wireless shadow networks
Sort
View
120
Voted
WISEC
2009
ACM
15 years 11 months ago
An attacker model for MANET routing security
Mobile ad-hoc networks are becoming ever more popular due to their flexibility, low cost, and ease of deployment. However, to achieve these benefits the network must employ a so...
Jared Cordasco, Susanne Wetzel
ACISICIS
2007
IEEE
15 years 11 months ago
A Comparative Study on the Performance of Wireless Sensor Networks
To increase the lifetime of the sensor networks, a recognized method is to switch off/on some sensor nodes between “sleep” and “activity” mode in order to save the energy....
Lin Zou, Zhongwei Zhang
COMCOM
2006
168views more  COMCOM 2006»
15 years 4 months ago
Relay node placement in large scale wireless sensor networks
Scalability and extended lifetime are two critical design goals of any large scale wireless sensor network. A two-tiered network model has been proposed recently for this purpose....
Jian Tang, Bin Hao, Arunabha Sen
WIOPT
2005
IEEE
15 years 10 months ago
Distributed Power Allocation and Scheduling for Parallel Channel Wireless Networks
In this paper we develop distributed approaches for power allocation and scheduling in wireless access networks. We consider a model where users communicate over a set of parallel...
Xiangping Qin, Randall Berry
174
Voted
TMC
2008
109views more  TMC 2008»
15 years 4 months ago
Intrusion Detection in Homogeneous and Heterogeneous Wireless Sensor Networks
Intrusion detection in Wireless Sensor Network (WSN) is of practical interest in many applications such as detecting an intruder in a battlefield. The intrusion detection is define...
Yun Wang, Xiaodong Wang, Bin Xie, Demin Wang, Dhar...