Sciweavers

1990 search results - page 286 / 398
» Anonymous communications in mobile ad hoc networks
Sort
View
QSHINE
2005
IEEE
14 years 2 months ago
Cooperative-Diversity Slotted ALOHA
We propose a cooperative-diversity technique for ad hoc networks based on the decode-and-forward relaying strategy. We develop a MAC protocol based on slotted ALOHA that allows ne...
Wing-Hin Wong, John M. Shea, Tan F. Wong
WIOPT
2010
IEEE
13 years 7 months ago
On the optimal design of MAC protocols in multi-hop ad hoc networks
Abstract—In this paper, we present our results on the performance of MAC protocols in multi-hop wireless ad hoc networks in terms of the newly proposed metric “aggregate multi-...
Mariam Kaynia, Pedro H. J. Nardell, Paulo Cardieri...
GLOBECOM
2008
IEEE
14 years 3 months ago
On the Statistics and MAC Implications of Channel Estimation Errors in MIMO Ad Hoc Networks
—In this paper, we propose an analytical technique to evaluate the statistics of the channel estimation error in a simple multi-user ad hoc networking scenario. This problem is v...
Davide Chiarotto, Paolo Casari, Michele Zorzi
VTC
2007
IEEE
14 years 3 months ago
Performance Evaluation of A Multiuser Detection Based MAC Design for Ad Hoc Networks
Abstract— In general, the performance and radio resource utilization of Ad Hoc networks are limited by half-duplex operation and possible collisions. In this paper, we propose a ...
Jinfang Zhang, Zbigniew Dziong, François Ga...
ACNS
2006
Springer
167views Cryptology» more  ACNS 2006»
14 years 26 days ago
Public Key Cryptography Sans Certificates in Ad Hoc Networks
Abstract. Several researchers have proposed the use of threshold cryptographic model to enable secure communication in ad hoc networks without the need of a trusted center. In this...
Nitesh Saxena