Sciweavers

1259 search results - page 142 / 252
» An Efficient Mobile Authentication Scheme for Wireless Netwo...
Sort
View
PERCOM
2006
ACM
14 years 7 months ago
Resource Allocation in Wireless Networks Using Directional Antennas
With the continued increase of speed and capacities of computing devices and the growing needs of people for mobile computing capabilities, Mobile ad hoc networks (MANETs) have gai...
Imad Jawhar, Jie Wu
ITIIS
2008
153views more  ITIIS 2008»
13 years 8 months ago
Two-level Key Pool Design-based Random Key Pre-distribution in Wireless Sensor Networks
In this paper, the random key pre-distribution scheme introduced in ACM CCS'02 by Eschenauer and Gligor is reexamined, and a generalized form of key establishment is introduc...
Abedelaziz Mohaisen, DaeHun Nyang, Tamer AbuHmed
ICPADS
2005
IEEE
14 years 1 months ago
Efficient Barrier Synchronization on Wireless Computing Systems
This work deals with efficient barrier synchronization for wireless cluster computing where nodes communicate with each other wirelessly in one or multiple hops. Such a computing ...
Nian-Feng Tzeng, Bhanurekha Kasula, Hongyi Wu
INFOCOM
2010
IEEE
13 years 6 months ago
Cooperative Bridges: Topology Control in Cooperative Wireless Ad Hoc Networks
Cooperative Communication (CC) is a technology that allows multiple nodes to simultaneously transmit the same data. It can save power and extend transmission coverage. However, pri...
Jieun Yu, Heejun Roh, Wonjun Lee, Sangheon Pack, D...
SIGMETRICS
2008
ACM
161views Hardware» more  SIGMETRICS 2008»
13 years 8 months ago
Noncooperative power control and transmission scheduling in wireless collision channels
We consider a wireless collision channel, shared by a finite number of mobile users who transmit to a common base station using a random access protocol. Mobiles are selfoptimizin...
Ishai Menache, Nahum Shimkin