Sciweavers

258 search results - page 27 / 52
» Security performance of loaded IEEE 802.11b wireless network...
Sort
View
SECON
2008
IEEE
15 years 6 months ago
SYNAPSE: A Network Reprogramming Protocol for Wireless Sensor Networks Using Fountain Codes
—Wireless reprogramming is a key functionality in Wireless Sensor Networks (WSNs). In fact, the requirements for the network may change in time, or new parameters might have to b...
Michele Rossi, Giovanni Zanca, Luca Stabellini, Ri...
ICC
2007
IEEE
177views Communications» more  ICC 2007»
15 years 6 months ago
An Energy-Aware Protocol for Data Gathering Applications in Wireless Sensor Networks
—Data gathering is a major function of many applications in wireless sensor networks (WSNs). The most important issue in designing a data gathering algorithm is how to save energ...
Ming Liu, Yuan Zheng, Jiannong Cao, Guihai Chen, L...
ICNP
2006
IEEE
15 years 5 months ago
RAIN: A Reliable Wireless Network Architecture
Abstract— Despite years of research and development, pioneering deployments of multihop wireless networks have not proven successful. The performance of routing and transport is ...
Chaegwon Lim, Haiyun Luo, Chong-Ho Choi
VTC
2008
IEEE
142views Communications» more  VTC 2008»
15 years 6 months ago
Adaptive Token Bank Fair Queuing Scheduling in the Downlink of 4G Wireless Multicarrier Networks
—In this paper we present an efficient cross-layer scheduling algorithm designed for resource allocation in downlink of 4G wireless multicarrier networks. This study focuses on ...
Feroz A. Bokhari, William K. Wong, Halim Yanikomer...
DSN
2004
IEEE
15 years 3 months ago
Intrusion Tolerance and Anti-Traffic Analysis Strategies For Wireless Sensor Networks
Wireless sensor networks face acute security concerns in applications such as battlefield monitoring. A central point of failure in a sensor network is the base station, which act...
Jing Deng, Richard Han, Shivakant Mishra