Sciweavers

2068 search results - page 62 / 414
» Performance Analysis of a Distributed Wireless Access Scheme
Sort
View
ADHOC
2008
132views more  ADHOC 2008»
14 years 10 months ago
Defending against cache consistency attacks in wireless ad hoc networks
Caching techniques can be used to reduce bandwidth consumption and data access delay in wireless ad hoc networks. When cache is used, the issue of cache consistency must be addres...
Wensheng Zhang, Guohong Cao
GLOBECOM
2007
IEEE
15 years 4 months ago
A Busy-Tone Based MAC Scheme for Wireless Ad Hoc Networks Using Directional Antennas
— Applying directional antennas in wireless ad hoc networks offers numerous benefits, such as extended communication range, increased spatial reuse, improved capacity and suppre...
Hongning Dai, Kam-Wing Ng, Min-You Wu
ICDCS
2008
IEEE
15 years 4 months ago
Real-Time Detection of Clone Attacks in Wireless Sensor Networks
A central problem in sensor network security is that sensors are susceptible to physical capture attacks. Once a sensor is compromised, the adversary can easily launch clone attac...
Kai Xing, Fang Liu, Xiuzhen Cheng, David Hung-Chan...
INFOCOM
2011
IEEE
14 years 1 months ago
A dynamic relay selection scheme for mobile users in wireless relay networks
—Cooperative communication has attracted dramatic attention in the last few years due to its advantage in mitigating channel fading. Despite much effort that has been made in the...
Yifan Li, Ping Wang, Dusit Niyato, Weihua Zhuang
SIGMETRICS
2010
ACM
214views Hardware» more  SIGMETRICS 2010»
15 years 2 months ago
Distributed sensor network localization from local connectivity: performance analysis for the HOP-TERRAIN algorithm
This paper addresses the problem of determining the node locations in ad-hoc sensor networks when only connectivity information is available. In previous work, we showed that the ...
Amin Karbasi, Sewoong Oh