Sciweavers

577 search results - page 99 / 116
» Throughput Scaling of Wireless Networks With Random Connecti...
Sort
View
INFOCOM
2005
IEEE
15 years 3 months ago
SyncScan: practical fast handoff for 802.11 infrastructure networks
Abstract— Wireless access networks scale by replicating base stations geographically and then allowing mobile clients to seamlessly “hand off” from one station to the next as...
Ishwar Ramani, Stefan Savage
WISEC
2010
ACM
15 years 2 months ago
Secret keys from entangled sensor motes: implementation and analysis
Key management in wireless sensor networks does not only face typical, but also several new challenges. The scale, resource limitations, and new threats such as node capture and c...
Matthias Wilhelm, Ivan Martinovic, Jens B. Schmitt
TMC
2008
146views more  TMC 2008»
14 years 9 months ago
Cross-Layer Interaction of TCP and Ad Hoc Routing Protocols in Multihop IEEE 802.11 Networks
In this research, we first investigate the cross-layer interaction between TCP and routing protocols in the IEEE 802.11 ad hoc network. On-demand ad hoc routing protocols respond t...
Kitae Nahm, Ahmed Helmy, C. C. Jay Kuo
CORR
2011
Springer
148views Education» more  CORR 2011»
14 years 4 months ago
Modeling the pairwise key distribution scheme in the presence of unreliable links
Abstract— We investigate the secure connectivity of wireless sensor networks under the pairwise key distribution scheme of Chan et al.. Unlike recent work which was carried out u...
Osman Yagan, Armand M. Makowski
RTAS
2009
IEEE
15 years 4 months ago
Real-Time Video Surveillance over IEEE 802.11 Mesh Networks
In recent years, there has been an increase in video surveillance systems in public and private environments due to a heightened sense of security. The next generation of surveill...
Arvind Kandhalu, Anthony Rowe, Ragunathan Rajkumar...