Sciweavers

11217 search results - page 452 / 2244
» Network Coding for Wireless Networks
Sort
View
JSAC
2006
127views more  JSAC 2006»
15 years 5 months ago
Location-based compromise-tolerant security mechanisms for wireless sensor networks
Abstract-- Node compromise is a serious threat to wireless sensor networks deployed in unattended and hostile environments. To mitigate the impact of compromised nodes, we propose ...
Yanchao Zhang, Wei Liu, Wenjing Lou, Yuguang Fang
169
Voted
INFOCOM
2010
IEEE
15 years 3 months ago
VBS: Maximum Lifetime Sleep Scheduling for Wireless Sensor Networks Using Virtual Backbones
—Wireless sensor network (WSN) applications require redundant sensors to guarantee fault tolerance. However, the same degree of redundancy is not necessary for multi-hop communic...
Yaxiong Zhao, Jie Wu, Feng Li, Sanglu Lu
CSREASAM
2006
15 years 6 months ago
Modelling to Enhance GSM Network Security
With the rapid development in global communication networks, the threat of security and in particular that of cellular telecommunication system is real and highly dangerous. Mobil...
Johnnes Arreymbi
153
Voted
MOBIHOC
2008
ACM
16 years 4 months ago
The capacity and energy efficiency of wireless ad hoc networks with multi-packet reception
We address the cost incurred in increasing the transport capacity of wireless ad hoc networks over what can be attained when sources and destinations communicate over multi-hop pa...
Zheng Wang, Hamid R. Sadjadpour, Jose Joaquin Garc...
ICC
2008
IEEE
115views Communications» more  ICC 2008»
15 years 11 months ago
Oblivious Routing for Wireless Mesh Networks
—Wireless mesh networks have attracted increasing attention and deployment as a high-performance and low-cost solution to last-mile broadband Internet access. Traffic routing pl...
Jonathan Wellons, Yuan Xue