Sciweavers

2268 search results - page 152 / 454
» Modeling wireless shadow networks
Sort
View
PIMRC
2010
IEEE
15 years 2 months ago
Connectivity in wireless networks with dynamic key compromise and recovery
Abstract--This paper considers the problem of key management in wireless networks. In particular, we investigate the effect of dynamic key compromise and recovery on connectivity i...
Satashu Goel, Aylin Yener
INFOCOM
2009
IEEE
15 years 11 months ago
Interference-Aware MAC Protocol for Wireless Networks by a Game-Theoretic Approach
—We propose an interference-aware MAC protocol using a simple transmission strategy motivated by a gametheoretic approach. We formulate a channel access game, which considers nod...
HyungJune Lee, Hyukjoon Kwon, Arik Motskin, Leonid...
161
Voted
TON
2008
136views more  TON 2008»
15 years 4 months ago
Density-based anycast: a robust routing strategy for wireless ad hoc networks
Abstract--Existing anycast routing protocols solely route packets to the closest group member. In this paper, we introduce density-based anycast routing, a new anycast routing para...
Vincent Lenders, Martin May, Bernhard Plattner
157
Voted
TWC
2008
156views more  TWC 2008»
15 years 4 months ago
Secure and Fault-Tolerant Event Boundary Detection in Wireless Sensor Networks
Event boundary detection is in and of itself a useful application in wireless sensor networks (WSNs). Typically, it includes the detection of a large-scale spatial phenomenon such ...
Kui Ren, Kai Zeng, Wenjing Lou
162
Voted
CDC
2009
IEEE
210views Control Systems» more  CDC 2009»
15 years 2 months ago
On maximum lifetime routing in Wireless Sensor Networks
Abstract-- Lifetime maximization is an important optimization problem specific to Wireless Sensor Networks (WSNs) since they operate with limited energy resources which are therefo...
Xu Ning, Christos G. Cassandras