Sciweavers

132 search results - page 15 / 27
» Unconditionally reliable message transmission in directed ne...
Sort
View
ICUIMC
2011
ACM
14 years 1 months ago
Opportunities of MIM capture in IEEE 802.11 WLANs: analytic study
Physical layer capture in WLANs makes a receiver to decode a relatively strong packet in a collision. According to recent works, an augmented physical layer capture handles interf...
Joonsoo Lee, Young-myoung Kang, Suchul Lee, Chong-...
SENSYS
2004
ACM
15 years 3 months ago
The dynamic behavior of a data dissemination protocol for network programming at scale
To support network programming, we present Deluge, a reliable data dissemination protocol for propagating large data objects from one or more source nodes to many other nodes over...
Jonathan W. Hui, David E. Culler
TPHOL
2009
IEEE
15 years 4 months ago
Let's Get Physical: Models and Methods for Real-World Security Protocols
Traditional security protocols are mainly concerned with key establishment and principal authentication and rely on predistributed keys and properties of cryptographic operators. I...
David A. Basin, Srdjan Capkun, Patrick Schaller, B...
JSAC
2008
136views more  JSAC 2008»
14 years 9 months ago
Relay-Assisted Decorrelating Multiuser Detector (RAD-MUD) for Cooperative CDMA Networks
Abstract-- In this paper, we examine the uplink of a cooperative CDMA network, where users cooperate by relaying each other's messages to the base station. When spreading wave...
Wan-Jen Huang, Yao-Win Peter Hong, C. C. Jay Kuo
MOBIHOC
2008
ACM
15 years 9 months ago
An approximation algorithm for conflict-aware broadcast scheduling in wireless ad hoc networks
Broadcast scheduling is a fundamental problem in wireless ad hoc networks. The objective of a broadcast schedule is to deliver a message from a given source to all other nodes in ...
Reza Mahjourian, Feng Chen, Ravi Tiwari, My T. Tha...