Sciweavers

890 search results - page 76 / 178
» On the attractiveness of the star network
Sort
View
COMSUR
2011
203views Hardware» more  COMSUR 2011»
13 years 11 months ago
Overcoming Adversaries in Sensor Networks: A Survey of Theoretical Models and Algorithmic Approaches for Tolerating Malicious In
Interference is an unavoidable property of the wireless communication medium and, in sensor networks, such interference is exacerbated due to the energy-starved nature of the netw...
Maxwell Young, Raouf Boutaba
GLOBECOM
2009
IEEE
15 years 6 months ago
Cognitive Radio Enhancements for Legacy Networks Using Cooperative Diversity
Abstract— Two driving goals for cognitive radio (CR) technique are maximizing spectrum utilization and avoiding interference to primary users. In this paper, we deal with the CR ...
Zhanwei Sun, Ioannis Krikidis, J. Nicholas Laneman...
NDSS
2008
IEEE
15 years 6 months ago
A Tune-up for Tor: Improving Security and Performance in the Tor Network
The Tor anonymous communication network uses selfreported bandwidth values to select routers for building tunnels. Since tunnels are allocated in proportion to this bandwidth, thi...
Robin Snader, Nikita Borisov
WETICE
2008
IEEE
15 years 6 months ago
Decentralized Network Analysis: A Proposal
In recent years, the peer-to-peer paradigm has gained momentum in several application areas: file-sharing and VoIP applications have been able to attract millions of end users, w...
Alberto Montresor
ICC
2007
IEEE
134views Communications» more  ICC 2007»
15 years 6 months ago
A MAC Protocol for Maximum Stream Allocation Depending on the Number of Antennas and Received RTS Packets in MIMO Ad Hoc Network
— MIMA-MAC is the most attractive MAC protocol for MIMO ad hoc networks, which consist of nodes with multiple antennas. MIMA-MAC, however, uses only a half of antennas for data t...
Motoki Shirasu, Iwao Sasase