Sciweavers

89 search results - page 12 / 18
» A framework for MAC protocol misbehavior detection in wirele...
Sort
View
ADHOCNOW
2005
Springer
14 years 1 months ago
Reed-Solomon and Hermitian Code-Based Scheduling Protocols for Wireless Ad Hoc Networks
Abstract. In this work we investigate bounds on throughput and delay performance of a scheduling protocol that derives its decisions from codes traditionally used to correct or det...
Carlos H. Rentel, Thomas Kunz
INFOCOM
2010
IEEE
13 years 5 months ago
Chorus: Collision Resolution for Efficient Wireless Broadcast
Traditional wireless broadcast protocols rely heavily on the 802.11-based CSMA/CA model, which avoids interference and collision by conservatively scheduling transmissions. While C...
Xinyu Zhang, Kang G. Shin
RTSS
2009
IEEE
14 years 2 months ago
Cross-Layer Analysis of the End-to-End Delay Distribution in Wireless Sensor Networks
—Emerging applications of wireless sensor networks (WSNs) require real-time quality of service (QoS) guarantees to be provided by the network. However, designing real-time schedu...
Yunbo Wang, Mehmet C. Vuran, Steve Goddard
CCR
2007
176views more  CCR 2007»
13 years 7 months ago
Enhanced wireless mesh networking for ns-2 simulator
The ns-2 simulator has limited support for simulating 802.11based wireless mesh networks. We have added the following new features at the MAC and PHY layer of ns-2: (i) cumulative...
Vivek Mhatre
IJNSEC
2011
232views more  IJNSEC 2011»
13 years 2 months ago
Location-aware, Trust-based Detection and Isolation of Compromised Nodes in Wireless Sensor Networks
The detection and isolation of compromised nodes in wireless sensor networks is a difficult task. However, failure to identify and isolate compromised nodes results in significan...
Garth V. Crosby, Lance Hester, Niki Pissinou