Sciweavers

525 search results - page 71 / 105
» Threshold Schemes with Disenrollment
Sort
View
WCNC
2008
IEEE
15 years 6 months ago
A Secure Routing Protocol in Proactive Security Approach for Mobile Ad-Hoc Networks
—Secure routing of Mobile Ad-hoc Networks (MANETs) is still a hard problem after years of research. We therefore propose to design a secure routing protocol in a new approach. Th...
Shushan Zhao, Akshai K. Aggarwal, Shuping Liu, Hua...
WCNC
2008
IEEE
15 years 6 months ago
On Spatial Reuse and Capture in Ad Hoc Networks
—Neighbors of both the transmitter and the receiver must keep quiet in a 802.11 wireless network as it requires bidirectional exchange, i.e., nodes reverse their roles as transmi...
Naveen Santhapuri, Srihari Nelakuditi, Romit Roy C...
ICC
2007
IEEE
120views Communications» more  ICC 2007»
15 years 6 months ago
Joint Power and Constellation Size Adaptation for Mobile Multicast Employing MQAM Over Wireless Fading Channels
Abstract— We propose a power and constellation-size adaptation scheme for the multicast system employing multilevel quadrature amplitude modulation (MQAM) with discrete constella...
Qinghe Du, Xi Zhang
ICC
2007
IEEE
123views Communications» more  ICC 2007»
15 years 6 months ago
A Game Theoretic Solution for Exploiting Multiuser Diversity in Cooperative Slotted Aloha
— In multiuser systems, multiuser diversity gains can be achieved by assigning channels to users with higher channel quality. To avoid the extensive information exchange required...
Cristina Comaniciu, Dandan Wang, Hlaing Minn, Naof...
ICC
2007
IEEE
15 years 6 months ago
PERD: Polynomial-based Event Region Detection in Wireless Sensor Networks
We propose a Polynomial-based scheme that addresses the problem of Event Region Detection (PERD) for wireless sensor networks (WSNs). Nodes of an aggregation tree perform function ...
Torsha Banerjee, Demin Wang, Bin Xie, Dharma P. Ag...