Sciweavers

11217 search results - page 359 / 2244
» Network Coding for Wireless Networks
Sort
View
INFOCOM
2008
IEEE
15 years 11 months ago
Throughput Anonymity Trade-off in Wireless Networks under Latency Constraints
—Providing anonymity to routes in a wireless ad hoc network from passive eavesdroppers is considered. Using Shannon’s equivocation as an information theoretic measure of anonym...
Parvathinathan Venkitasubramaniam, Lang Tong
INFOCOM
2005
IEEE
15 years 10 months ago
Secure positioning of wireless devices with application to sensor networks
Abstract— So far, the problem of positioning in wireless networks has been mainly studied in a non-adversarial setting. In this work, we analyze the resistance of positioning tec...
Srdjan Capkun, Jean-Pierre Hubaux
SAINT
2003
IEEE
15 years 10 months ago
Challenges in Intrusion Detection for Wireless Ad-hoc Networks
This paper presents a brief survey of current research in intrusion detection for wireless ad-hoc networks. In addition to examining the challenges of providing intrusion detectio...
Paul Brutch, Calvin Ko
HICSS
2002
IEEE
100views Biometrics» more  HICSS 2002»
15 years 9 months ago
Multipoint Relaying for Flooding Broadcast Messages in Mobile Wireless Networks
In this paper we discuss the mechanism of multipoint relays (MPRs) to efficiently do the flooding of broadcast messages in the mobile wireless networks. Multipoint relaying is a...
Amir Qayyum, Laurent Viennot, Anis Laouiti
ICCCN
2007
IEEE
15 years 8 months ago
Algorithms for Communication in Wireless multi-hop ad hoc Networks using Broadcasts in Opportunistic Large Arrays (OLA)
A new physical layer technique [1] for broadcasting in multi-hop wireless ad hoc networks makes broadcast a much more efficient building block than traditional flooding broadcast. ...
Edoardo S. Biagioni