Sciweavers

148 search results - page 26 / 30
» A Deterministic Approach to Wireless Relay Networks
Sort
View
BROADNETS
2007
IEEE
14 years 2 months ago
Detecting protected layer-3 rogue APs
— Unauthorized rogue access points (APs), such as those brought into a corporate campus by employees, pose a security threat as they may be poorly managed or insufficiently secu...
Hongda Yin, Guanling Chen, Jie Wang
PERCOM
2007
ACM
14 years 7 months ago
Analytical modeling and mitigation techniques for the energy hole problem in sensor networks
In this paper we investigate the problem of uneven energy consumptions in a large class of many-to-one sensor networks. In a many-to-one sensor network, all sensor nodes generate ...
Jian Li, Prasant Mohapatra
INFOCOM
2009
IEEE
14 years 2 months ago
Exact Analysis of Latency of Stateless Opportunistic Forwarding
Abstract—Stateless opportunistic forwarding is a simple faulttolerant distributed approach for data delivery and information querying in wireless ad hoc networks, where packets a...
Chi-Kin Chau, Prithwish Basu
CORR
2008
Springer
99views Education» more  CORR 2008»
13 years 7 months ago
An Energy-Based Comparison of Long-Hop and Short-Hop Routing in MIMO Networks
This paper considers the problem of selecting either routes that consist of long hops or routes that consist of short hops in a network of multiple-antenna nodes, where each trans...
Caleb K. Lo, Sriram Vishwanath, Robert W. Heath Jr...
PERCOM
2007
ACM
14 years 7 months ago
Dynamic Carrier-Assisted Routing in Mobile Networks
We propose to use node mobility to enhance routing capability in a mobile network. A dual-control planes model is presented, which includes the traditional S(stationary)-plane for ...
Jie Wu