Sciweavers

2068 search results - page 62 / 414
» Performance Analysis of a Distributed Wireless Access Scheme
Sort
View
151
Voted
ADHOC
2008
132views more  ADHOC 2008»
15 years 3 months ago
Defending against cache consistency attacks in wireless ad hoc networks
Caching techniques can be used to reduce bandwidth consumption and data access delay in wireless ad hoc networks. When cache is used, the issue of cache consistency must be addres...
Wensheng Zhang, Guohong Cao
147
Voted
GLOBECOM
2007
IEEE
15 years 10 months ago
A Busy-Tone Based MAC Scheme for Wireless Ad Hoc Networks Using Directional Antennas
— Applying directional antennas in wireless ad hoc networks offers numerous benefits, such as extended communication range, increased spatial reuse, improved capacity and suppre...
Hongning Dai, Kam-Wing Ng, Min-You Wu
134
Voted
ICDCS
2008
IEEE
15 years 10 months ago
Real-Time Detection of Clone Attacks in Wireless Sensor Networks
A central problem in sensor network security is that sensors are susceptible to physical capture attacks. Once a sensor is compromised, the adversary can easily launch clone attac...
Kai Xing, Fang Liu, Xiuzhen Cheng, David Hung-Chan...
167
Voted
INFOCOM
2011
IEEE
14 years 7 months ago
A dynamic relay selection scheme for mobile users in wireless relay networks
—Cooperative communication has attracted dramatic attention in the last few years due to its advantage in mitigating channel fading. Despite much effort that has been made in the...
Yifan Li, Ping Wang, Dusit Niyato, Weihua Zhuang
SIGMETRICS
2010
ACM
214views Hardware» more  SIGMETRICS 2010»
15 years 8 months ago
Distributed sensor network localization from local connectivity: performance analysis for the HOP-TERRAIN algorithm
This paper addresses the problem of determining the node locations in ad-hoc sensor networks when only connectivity information is available. In previous work, we showed that the ...
Amin Karbasi, Sewoong Oh