Sciweavers

2268 search results - page 369 / 454
» Modeling wireless shadow networks
Sort
View
SASN
2005
ACM
15 years 10 months ago
On the security of group communication schemes based on symmetric key cryptosystems
Many emerging applications in both wired and wireless networks, such as information dissemination and distributed collaboration in an adversarial environment, need support of secu...
Shouhuai Xu
152
Voted
MOBISYS
2009
ACM
16 years 5 months ago
A methodology for extracting temporal properties from sensor network data streams
The extraction of temporal characteristics from sensor data streams can reveal important properties about the sensed events. Knowledge of temporal characteristics in applications ...
Dimitrios Lymberopoulos, Athanasios Bamis, Andreas...
152
Voted
HASE
2008
IEEE
15 years 11 months ago
Power Optimization in Fault-Tolerant Mobile Ad Hoc Networks
—In this paper, we investigate the transmission-power assignment problem for k-connected mobile ad hoc networks (MANETs), the problem of optimizing the lifetime of a MANET at a g...
Oliviero Riganelli, Radu Grosu, Samir R. Das, C. R...
INFOCOM
2006
IEEE
15 years 10 months ago
On Hybrid Collision Control for IEEE 802.11 Ad-Hoc Networks
— We present in this work a new mechanism based on an innovative hybrid approach for traffic and collision control in wireless ad hoc networks. We combine the well known equatio...
Hicham Khalife
DCOSS
2006
Springer
15 years 8 months ago
An Optimal Data Propagation Algorithm for Maximizing the Lifespan of Sensor Networks
We consider the problem of data propagation in wireless sensor networks and revisit the family of mixed strategy routing schemes. We show that maximizing the lifespan, balancing th...
Aubin Jarry, Pierre Leone, Olivier Powell, Jos&eac...