Sciweavers

4985 search results - page 902 / 997
» Re-Configurable Computing in Wireless
Sort
View
127
Voted
WIOPT
2006
IEEE
15 years 9 months ago
Analyzing the impact of neighbor sensing on the performance of the OLSR protocol
— This paper presents an analysis of several neighbor sensing approaches for the OLSR routing protocol. While several performance studies of OLSR proceed this work, few attention...
Michael Voorhaen, Chris Blondia
WIOPT
2006
IEEE
15 years 9 months ago
Online association policies in IEEE 802.11 WLANs
Abstract— In this paper, we study the performance of clientAccess Point (AP) association policies in IEEE 802.11 based WLANs. In many scenarios, clients have a choice of APs with...
Gaurav Kasbekar, Joy Kuri, Pavan Nuggehalli
WIOPT
2006
IEEE
15 years 9 months ago
Reverse engineering MAC
— This paper reverse-engineers backoff-based random-access MAC protocols in ad-hoc networks. We show that the contention resolution algorithm in such protocols is implicitly part...
Ao Tang, Jang-Won Lee, Jianwei Huang, Mung Chiang,...
ADHOCNOW
2006
Springer
15 years 9 months ago
Circularity-Based Medium Access Control in Mobile Ad Hoc Networks
Abstract. The RTS/CTS access scheme, designed to reduce the number of collisions in a IEEE 802.11 network, is known to exhibit problems due to masked nodes, the imbalance between t...
Mohammad Z. Ahmad, Damla Turgut, R. Bhakthavathsal...
ADHOCNOW
2006
Springer
15 years 9 months ago
Key Revocation for Identity-Based Schemes in Mobile Ad Hoc Networks
Recently, identity-based cryptographic (IBC) schemes have been considered to secure mobile ad hoc networks (MANETs) due to their efficient key management properties. However, propo...
Katrin Hoeper, Guang Gong