Sciweavers

2268 search results - page 130 / 454
» Modeling wireless shadow networks
Sort
View
CCR
2007
176views more  CCR 2007»
15 years 4 months ago
Enhanced wireless mesh networking for ns-2 simulator
The ns-2 simulator has limited support for simulating 802.11based wireless mesh networks. We have added the following new features at the MAC and PHY layer of ns-2: (i) cumulative...
Vivek Mhatre
MOBIHOC
2000
ACM
15 years 9 months ago
Utility-based decision-making in wireless sensor networks
— We consider challenges associated with application domains in which a large number of distributed, networked sensors must perform a sensing task repeatedly over time. We addres...
John W. Byers, Gabriel Nasser
TWC
2008
142views more  TWC 2008»
15 years 4 months ago
Cooperative Diversity in Interference Limited Wireless Networks
Using relays in wireless networks can potentially lead to significant capacity increases. However, within an asynchronous multi-user communication setting, relaying might cause mor...
Sam Vakil, Ben Liang
182
Voted
ICUMT
2009
15 years 2 months ago
Coverage and adaptive scheduling algorithms for criticality management on video wireless sensor networks
In WSN-based surveillance systems power conservation is an important issue but one must also ensure that the application's objectives are met. In this paper, we jointly addres...
Abdallah Makhoul, Rachid Saadi, CongDuc Pham
ICC
2009
IEEE
153views Communications» more  ICC 2009»
15 years 11 months ago
Detecting Malicious Packet Dropping in the Presence of Collisions and Channel Errors in Wireless Ad Hoc Networks
—Detecting malicious packet dropping is important in ad hoc networks to combat a variety of security attacks such as blackhole, greyhole, and wormhole attacks. We consider the de...
Thaier Hayajneh, Prashant Krishnamurthy, David Tip...