Sciweavers

601 search results - page 78 / 121
» On-demand Power Management for Ad Hoc Networks
Sort
View
HICSS
2003
IEEE
200views Biometrics» more  HICSS 2003»
15 years 3 months ago
Scatternet Formation of Bluetooth Ad Hoc Networks
Scatternet formation must be addressed before any ad hoc network protocol can be run over Bluetooth. This is due to the frequency hop nature and piconet unit of Bluetooth. In this...
Bin Zhen, Jonghun Park, Yongsuk Kim
ADHOC
2005
176views more  ADHOC 2005»
14 years 9 months ago
A survey of Mobile IP in cellular and Mobile Ad-Hoc Network environments
The Internet has become ubiquitous and there has been tremendous growth in wireless communications in recent years. Many wireless communication techniques are commercially availab...
Tin Yu Wu, Ching-Yang Huang, Han-Chieh Chao
MOBIHOC
2005
ACM
15 years 9 months ago
On the node-scheduling approach to topology control in ad hoc networks
: In this paper, we analyze the node scheduling approach of topology control in the context of reliable packet delivery. In node scheduling, only a minimum set of nodes needed for ...
Budhaditya Deb, Badri Nath
GLOBECOM
2008
IEEE
15 years 4 months ago
Delay-Energy Tradeoffs in Wireless Ad-Hoc Networks with Partial Channel State Information
Given a wireless network where each link undergoes small-scale (Rayleigh) fading, we consider the problem of routing a message from a source node to a target node while minimizing...
Matthew Brand, Andreas F. Molisch
GLOBECOM
2007
IEEE
15 years 4 months ago
Secure Key Management Architecture Against Sensor-Node Fabrication Attacks
Abstract—In lightweight mobile ad hoc networks, both probabilistic and deterministic key management schemes are fragile to node fabrication attacks. Our simulation results show t...
Jeffrey S. Dwoskin, Dahai Xu, Jianwei Huang, Mung ...