Sciweavers

9401 search results - page 92 / 1881
» Wireless Networks
Sort
View
108
Voted
WS
2006
ACM
15 years 9 months ago
Integrity regions: authentication through presence in wireless networks
We introduce Integrity (I) regions, a novel security primitive that enables message authentication in wireless networks without the use of pre-established or pre-certified keys. ...
Srdjan Capkun, Mario Cagalj
123
Voted
CORR
2010
Springer
142views Education» more  CORR 2010»
15 years 3 months ago
Algebraic Network Coding Approach to Deterministic Wireless Relay Networks
The deterministic wireless relay network model, introduced by Avestimehr et al., has been proposed for approximating Gaussian relay networks. This model, known as the ADT network m...
MinJi Kim, Muriel Médard
161
Voted
WASA
2010
Springer
236views Algorithms» more  WASA 2010»
15 years 1 months ago
A Game Theoretic Approach to Multi-radio Multi-channel Assignment in Wireless Networks
Abstract. It has been long recognized that the interference among concurrent wireless transmissions plays a crucial role in limiting the performance of wireless networks. Recently,...
Devu Manikantan Shila, Yu Cheng, Tricha Anjali
130
Voted
WONS
2005
IEEE
15 years 9 months ago
Common Gateway Architecture for Mobile Ad-Hoc Networks
Ad-hoc networks are by definition created on demand, without any infrastructure. On the other hand, they are often considered as an extension of the range of Internet access poin...
Marcin Michalak, Torsten Braun
144
Voted
TON
2008
134views more  TON 2008»
15 years 3 months ago
Efficient broadcasting using network coding
Abstract-- We consider the problem of broadcasting in an adhoc wireless network, where all nodes of the network are sources that want to transmit information to all other nodes. Ou...
Christina Fragouli, Jörg Widmer, Jean-Yves Le...