Sciweavers

1934 search results - page 284 / 387
» Radio Networks with Reliable Communication
Sort
View
SPAA
2003
ACM
15 years 6 months ago
Information gathering in adversarial systems: lines and cycles
In this paper we consider the problem of routing packets to a single destination in a dynamically changing network, where both the network and the packet injections are under adve...
Kishore Kothapalli, Christian Scheideler
95
Voted
ICC
2007
IEEE
15 years 7 months ago
Quality-of-Service Routing in Heterogeneous Networks with Optimal Buffer and Bandwidth Allocation
—We present an interdomain routing protocol for heterogeneous networks employing different queuing service disciplines. Our routing protocol finds optimal interdomain paths with ...
Waseem Sheikh, Arif Ghafoor
INFOCOM
2000
IEEE
15 years 5 months ago
Virtual Backbone Generation and Maintenance in Ad Hoc Network Mobility Management
Abstract—In this paper, we present the implementation issues of a virtual backbone that supports the operations of the Uniform Quorum System (UQS) and the Randomized Database Gro...
Ben Liang, Zygmunt J. Haas
GLOBECOM
2009
IEEE
15 years 4 months ago
Detecting Identity Spoofs in IEEE 802.11e Wireless Networks
Abstract--Wireless networks are vulnerable to identity spoofing attacks, where an attacker can forge the MAC address of his wireless device to assume the identity of another victim...
Gayathri Chandrasekaran, John-Austen Francisco, Vi...
94
Voted
CORR
2008
Springer
91views Education» more  CORR 2008»
15 years 25 days ago
A Distributed MAC Protocol for Cooperation in Random Access Networks
WLAN is one of the most successful applications of wireless communications in daily life because of low cost and ease of deployment. The enabling technique for this success is the ...
Georg Böcherer, Alexandre de Baynast