Sciweavers

1259 search results - page 70 / 252
» An Efficient Mobile Authentication Scheme for Wireless Netwo...
Sort
View
ADHOC
2006
124views more  ADHOC 2006»
13 years 8 months ago
Mobility-capacity-delay trade-off in wireless ad hoc networks
We show that there is a trade-off among mobility, capacity, and delay in ad hoc networks. More specifically, we consider two schemes for node mobility in ad hoc networks. We divid...
Renato M. de Moraes, Hamid R. Sadjadpour, J. J. Ga...
COMCOM
2007
168views more  COMCOM 2007»
13 years 8 months ago
An efficient cluster-based multi-channel management protocol for wireless Ad Hoc networks
—In Ad Hoc networking, cluster-based communication protocol can reduce large amount of flooding packets in route establishment process. However, the 802.11 medium access control ...
Gwo-Jong Yu, Chih-Yung Chang
ICC
2008
IEEE
159views Communications» more  ICC 2008»
14 years 2 months ago
A Performance Study of Mobile Handoff Delay in IEEE 802.11-Based Wireless Mesh Networks
— Wireless mesh networks (WMNs) have recently emerged to be a cost-effective solution to support large-scale wireless Internet access. One important component of realizing large-...
Akshay Mangalam Srivatsa, Jiang Xie
AINA
2003
IEEE
14 years 1 months ago
A Safe Multiple Access-Rates Transmission (SMART) Scheme for IEEE 802.11 Wireless Networks
Abstract— The IEEE 802.11 standard and enhanced amendments have defined fourteen transmission rates (1/2/5.5/6/9/11/12/ 18/22/24/33/36/48/54 Mb/s) for mobile stations to transmi...
Shiann-Tsong Sheu, Jenhui Chen, Hsueh-Wen Tseng, H...
CIIT
2007
195views Communications» more  CIIT 2007»
13 years 9 months ago
Using a cache scheme to detect selfish nodes in mobile ad hoc networks
This paper presents a hardware based cache scheme to detect selfish nodes in mobile ad hoc network. In this scheme, the hardware monitors the activities of the upperlayer software...
H. Lin, José G. Delgado-Frias, Sirisha Medi...