Sciweavers

2068 search results - page 142 / 414
» Performance Analysis of a Distributed Wireless Access Scheme
Sort
View
GLOBECOM
2009
IEEE
15 years 7 months ago
Multi-Path Key Establishment against REM Attacks in Wireless Ad Hoc Networks
Secure communications in wireless ad hoc networks require setting up end-to-end secret keys for communicating node pairs. Due to physical limitations and scalability requirements, ...
Tian Lan, Ruby B. Lee, Mung Chiang
INFFUS
2008
119views more  INFFUS 2008»
15 years 4 months ago
A scalable correlation aware aggregation strategy for wireless sensor networks
Sensors-to-sink data in wireless sensor networks (WSNs) are typically correlated with each other. Exploiting such correlation when performing data aggregation can result in consid...
Yujie Zhu, Ramanuja Vedantham, Seung-Jong Park, Ra...
MOBIWAC
2009
ACM
15 years 10 months ago
Protocol design and analysis of a HIP-based per-application mobility management platform
Rapid evolution of wireless networking has provided wide-scale of different wireless access technologies like Bluetooth, ZigBee, 802.11a/b/g, DSRC, 3G UMTS, LTE, WiMAX, etc. The c...
László Bokor, László T...
CORR
2011
Springer
155views Education» more  CORR 2011»
14 years 7 months ago
The Theory of Intervention Games for Resource Sharing in Wireless Communications
This paper develops a game-theoretic framework for the design and analysis of a new class of incentive schemes called intervention schemes. We formulate intervention games, propos...
Jaeok Park, Mihaela van der Schaar
VTC
2010
IEEE
242views Communications» more  VTC 2010»
15 years 2 months ago
A Cross-Layer Design Based on Geographic Information for Cooperative Wireless Networks
—Most of geographic routing approaches in wireless ad hoc and sensor networks do not take into consideration the medium access control (MAC) and physical layers when designing a ...
Teck Aguilar, Mohamed Chedly Ghedira, Syue-Ju Syue...